File: //home/bandeirantesbomb3/logs/error_log
[Sun Mar 15 03:17:30.071144 2026] [ssl:warn] [pid 6229:tid 140412349433728] AH01909: bandeirantesbomb3.hospedagemdesites.ws:443:0 server certificate does NOT include an ID which matches the server name
[Sun Mar 15 03:20:21.908692 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.244.31:41284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZPpbABkC4fWIHEf8EUawAAAFI"]
[Sun Mar 15 03:22:45.016228 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:57704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZQNbABkC4fWIHEf8EU3gAAAEY"]
[Sun Mar 15 03:25:27.150757 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:50058] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZQ1nbQATo66fKoS7xsZgAAAMU"]
[Sun Mar 15 03:27:48.291248 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:41760] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZRZLABkC4fWIHEf8EVvwAAAEs"]
[Sun Mar 15 03:30:42.844647 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:37920] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZSErABkC4fWIHEf8EWLgAAAEY"]
[Sun Mar 15 03:33:07.819009 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.228.16:34980] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZSoXjZBu2q05ozVU9-dwAAAUs"]
[Sun Mar 15 03:35:13.589259 2026] [:error] [pid 21805:tid 140411741927168] [client 129.146.135.227:54487] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZTIbABkC4fWIHEf8EXLAAAAEA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:35:25.008263 2026] [access_compat:error] [pid 21806:tid 140411683178240] [client 141.98.11.23:52595] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 03:35:29.079079 2026] [access_compat:error] [pid 21946:tid 140411716749056] [client 141.98.11.23:53310] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 03:35:59.230034 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:49550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZTT9SswJuvopo3lOiR4AAAAJM"]
[Sun Mar 15 03:36:04.206592 2026] [:error] [pid 21533:tid 140411741927168] [client 129.146.135.227:53097] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZTVHjZBu2q05ozVU9_ZwAAAUA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:42:16.972785 2026] [:error] [pid 21805:tid 140411590858496] [client 129.146.135.227:63615] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZUyLABkC4fWIHEf8EZhQAAAFI"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:48:48.417398 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:35784] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZWUNSswJuvopo3lOiUfAAAAIU"]
[Sun Mar 15 03:51:52.033328 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:59270] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZXCLABkC4fWIHEf8EbwwAAAEw"]
[Sun Mar 15 03:54:13.879629 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:36466] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZXldSswJuvopo3lOiWEQAAAIw"]
[Sun Mar 15 03:57:04.586739 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:37632] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZYQHbQATo66fKoS7xzWgAAANc"]
[Sun Mar 15 03:59:14.806240 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:39056] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZYwnjZBu2q05ozVU-FgwAAAUU"]
[Sun Mar 15 04:02:25.903185 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:51936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZZgdSswJuvopo3lOiXZwAAAJM"]
[Sun Mar 15 04:04:41.789626 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.228.16:41336] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZaCXbQATo66fKoS7x05wAAAM8"]
[Sun Mar 15 04:07:31.099101 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:35354] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZas7ABkC4fWIHEf8Ee7wAAAFE"]
[Sun Mar 15 04:09:52.076697 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.228.16:37196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZbQHbQATo66fKoS7x14AAAAMc"]
[Sun Mar 15 04:12:51.760046 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:52464] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZb87ABkC4fWIHEf8Ef6wAAAFU"]
[Sun Mar 15 04:15:17.654365 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.228.16:53710] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZchbABkC4fWIHEf8EgRgAAAEU"]
[Sun Mar 15 04:18:04.227703 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:44758] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZdLHjZBu2q05ozVU-ItgAAAUM"]
[Sun Mar 15 04:20:29.499472 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:39392] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZdvdSswJuvopo3lOiaeQAAAI8"]
[Sun Mar 15 04:23:21.775842 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.244.31:51118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZeadSswJuvopo3lOibBAAAAIk"]
[Sun Mar 15 04:25:55.322841 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:40948] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZfA3bQATo66fKoS7x5BAAAAMI"]
[Sun Mar 15 04:28:32.635419 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.244.31:45304] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZfoHbQATo66fKoS7x5iAAAAM0"]
[Sun Mar 15 04:30:58.472517 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:45208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZgMrABkC4fWIHEf8EjBwAAAFg"]
[Sun Mar 15 04:33:56.235866 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.244.31:45336] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZg5NSswJuvopo3lOic3AAAAI8"]
[Sun Mar 15 04:36:17.234498 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:43090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZhcXjZBu2q05ozVU-L0gAAAVQ"]
[Sun Mar 15 04:39:06.459821 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.244.31:60100] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZiGnbQATo66fKoS7x7jAAAAM8"]
[Sun Mar 15 04:52:00.097615 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:42534] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZlIHjZBu2q05ozVU-OcwAAAVQ"]
[Sun Mar 15 04:55:00.963720 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:55270] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZl1HjZBu2q05ozVU-O2QAAAUs"]
[Sun Mar 15 04:57:21.918825 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:55818] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZmYbABkC4fWIHEf8EnUQAAAFc"]
[Sun Mar 15 05:00:09.542199 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.244.31:36400] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZnCXjZBu2q05ozVU-PnAAAAUU"]
[Sun Mar 15 05:02:30.098788 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:52486] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZnlrABkC4fWIHEf8EocwAAAFc"]
[Sun Mar 15 05:05:34.327313 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:33046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZoTtSswJuvopo3lOiiNgAAAIs"]
[Sun Mar 15 05:07:49.774938 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.228.16:36948] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZo1dSswJuvopo3lOiijAAAAIA"]
[Sun Mar 15 05:10:40.284649 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:49396] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZpgNSswJuvopo3lOijIQAAAIo"]
[Sun Mar 15 05:13:00.546857 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:49240] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZqDHbQATo66fKoS7yBmAAAAMA"]
[Sun Mar 15 05:16:02.548821 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:56110] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZqwnbQATo66fKoS7yCBAAAAMQ"]
[Sun Mar 15 05:18:21.139102 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:39856] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZrTdSswJuvopo3lOikVgAAAIw"]
[Sun Mar 15 05:20:06.395859 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:60442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZrttSswJuvopo3lOiktAAAAIw"]
[Sun Mar 15 05:21:13.405857 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.244.31:60650] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZr-bABkC4fWIHEf8ErsQAAAFM"]
[Sun Mar 15 05:23:23.375460 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.228.16:49836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZse3jZBu2q05ozVU-T0gAAAVI"]
[Sun Mar 15 05:26:31.057966 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:42350] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZtN3jZBu2q05ozVU-URAAAAUY"]
[Sun Mar 15 05:28:48.652978 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:47616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZtwLABkC4fWIHEf8Es5QAAAE8"]
[Sun Mar 15 05:31:36.730828 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44440] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZuaNSswJuvopo3lOimtAAAAIU"]
[Sun Mar 15 05:33:55.316823 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:57962] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZu83jZBu2q05ozVU-VbAAAAUw"]
[Sun Mar 15 05:37:04.459818 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:33596] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZvsHjZBu2q05ozVU-V9AAAAUk"]
[Sun Mar 15 05:39:16.565787 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:60116] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZwNHjZBu2q05ozVU-WVgAAAUQ"]
[Sun Mar 15 05:42:11.935122 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:44368] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZw43bQATo66fKoS7yGSQAAAMQ"]
[Sun Mar 15 05:55:00.299465 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:44756] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZz5HbQATo66fKoS7yJbAAAAM4"]
[Sun Mar 15 05:57:55.230330 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:34086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ0k9SswJuvopo3lOircwAAAJY"]
[Sun Mar 15 06:00:15.846933 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:55294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ1H3bQATo66fKoS7yKKAAAAMI"]
[Sun Mar 15 06:03:01.670673 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.244.31:41216] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ1xXjZBu2q05ozVU-aWQAAAUA"]
[Sun Mar 15 06:05:22.499326 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:60316] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ2UrABkC4fWIHEf8Ey-QAAAEM"]
[Sun Mar 15 06:08:21.593541 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.244.31:53622] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ3BbABkC4fWIHEf8EzigAAAEo"]
[Sun Mar 15 06:10:45.728352 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:55010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ3lXjZBu2q05ozVU-bywAAAUQ"]
[Sun Mar 15 06:14:24.269877 2026] [:error] [pid 21806:tid 140411733534464] [client 94.26.106.205:39920] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4cNSswJuvopo3lOiutQAAAIE"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:28.049556 2026] [:error] [pid 21946:tid 140411741927168] [client 94.26.106.205:39914] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dHbQATo66fKoS7yNWAAAAMA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:29.519179 2026] [:error] [pid 21946:tid 140411699963648] [client 94.26.106.205:39914] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dXbQATo66fKoS7yNYAAAAMU"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:29.763774 2026] [:error] [pid 21946:tid 140411574073088] [client 94.26.106.205:39916] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dXbQATo66fKoS7yNYwAAANQ"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:31.602461 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:51154] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ4d9SswJuvopo3lOiuwQAAAJQ"]
[Sun Mar 15 06:15:48.174794 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.228.16:46826] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ4xHbQATo66fKoS7yNrwAAANI"]
[Sun Mar 15 06:19:34.054556 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:57468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ5pnjZBu2q05ozVU-dqgAAAUQ"]
[Sun Mar 15 06:21:08.647385 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:52832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ6BLABkC4fWIHEf8E2QQAAAEg"]
[Sun Mar 15 06:25:01.967076 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:48130] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ67bABkC4fWIHEf8E3BQAAAFg"]
[Sun Mar 15 06:26:15.782526 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:37728] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ7N7ABkC4fWIHEf8E3MAAAAEo"]
[Sun Mar 15 06:30:09.084122 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:40062] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ8IdSswJuvopo3lOixewAAAJc"]
[Sun Mar 15 06:31:38.703859 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:40754] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ8erABkC4fWIHEf8E4TAAAAEY"]
[Sun Mar 15 06:35:25.419851 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.244.31:33084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ9XXjZBu2q05ozVU-gdAAAAU8"]
[Sun Mar 15 06:36:49.908144 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:57440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ9sdSswJuvopo3lOiyrAAAAII"]
[Sun Mar 15 06:40:35.703568 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:45714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ-k3bQATo66fKoS7yScgAAAMk"]
[Sun Mar 15 06:42:14.381310 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:51474] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ-9nbQATo66fKoS7yS1AAAAMQ"]
[Sun Mar 15 06:46:01.114754 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.244.31:39020] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ_2XjZBu2q05ozVU-jGQAAAVU"]
[Sun Mar 15 06:57:56.214903 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:35632] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaCpLABkC4fWIHEf8E-2QAAAE4"]
[Sun Mar 15 07:00:40.813782 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 45.227.253.15:38562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:06.322555 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:28.125806 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:49.125804 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:12.329781 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:34.129773 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:47.726935 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:35240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaDx9SswJuvopo3lOi5pAAAAII"]
[Sun Mar 15 07:02:55.133775 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:11.683174 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:35808] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaD39SswJuvopo3lOi5vQAAAJE"]
[Sun Mar 15 07:03:16.110191 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:37.122061 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:58.377809 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:04:20.117807 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:04:42.362784 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:04.141811 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:25.130879 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:46.128180 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:08.125797 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:29.577935 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:51.058095 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:12.141816 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:33.125851 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:52.261521 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:49022] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaE-HjZBu2q05ozVU-oSQAAAUs"]
[Sun Mar 15 07:07:55.138059 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:16.137132 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:37.121813 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:58.126577 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:09:20.027826 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:09:30.012160 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.228.16:49618] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaFWtSswJuvopo3lOi6ogAAAIg"]
[Sun Mar 15 07:09:41.129794 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:02.133843 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:25.126695 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:46.137810 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:07.129809 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:29.129843 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:31.492032 2026] [access_compat:error] [pid 11972:tid 140411641214720] [client 161.97.104.217:64093] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 07:11:32.851718 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 161.97.104.217:65348] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:48.705041 2026] [access_compat:error] [pid 21946:tid 140411607643904] [client 161.97.104.217:49400] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:50.092462 2026] [access_compat:error] [pid 21806:tid 140411557287680] [client 161.97.104.217:49428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 07:11:50.125773 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:51.594121 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 161.97.104.217:49428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:51.801483 2026] [access_compat:error] [pid 21946:tid 140411708356352] [client 161.97.104.217:49400] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 07:12:12.129820 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:12:33.134029 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:12:54.125844 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:09.221944 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.244.31:52532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaGNbABkC4fWIHEf8FBiQAAAFM"]
[Sun Mar 15 07:13:15.073856 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:37.125781 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:58.128229 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:14:19.125835 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:14:40.046911 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:34550] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaGkHbQATo66fKoS7ya3QAAAMQ"]
[Sun Mar 15 07:14:41.045850 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:03.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:25.121196 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:47.129829 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:09.137862 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:31.133822 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:52.145769 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:13.917818 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:35.137963 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:56.070832 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:18:17.041824 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:18:18.913956 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:44640] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaHanbQATo66fKoS7ybfwAAAMU"]
[Sun Mar 15 07:18:39.021904 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:00.142327 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:21.113901 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:42.149787 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:58.598958 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.228.16:54374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaHzpqj1wV0Si-OkecvzgAAABY"]
[Sun Mar 15 07:20:03.144865 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:20:24.129879 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:20:45.137845 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:06.125858 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:28.138001 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:50.137805 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:11.113932 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:32.110158 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:53.037811 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:15.132393 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:36.157839 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:40.953221 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.244.31:60134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaIrHjZBu2q05ozVU-siQAAAUg"]
[Sun Mar 15 07:23:57.121888 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40954] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:24:19.097174 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:24:40.045817 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:01.124607 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:05.418493 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:43208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaJAHjZBu2q05ozVU-srAAAAUE"]
[Sun Mar 15 07:25:22.129819 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:44.096109 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:05.133861 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:26.129856 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:47.149879 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:09.125822 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:31.133777 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:52.130220 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:13.149817 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:35.149608 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:49.982273 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.244.31:46188] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaJ4Zqj1wV0Si-OkecxCwAAAAY"]
[Sun Mar 15 07:28:56.129842 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:17.098484 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:38.120610 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:59.122124 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:30:18.485019 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:48832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaKOnjZBu2q05ozVU-tbgAAAUg"]
[Sun Mar 15 07:30:20.137816 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:30:41.125782 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:02.084033 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:24.033835 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:46.133832 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:48.744770 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] [client 157.15.40.93:45384] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 07:32:07.121862 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:32:29.057844 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:32:50.021883 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:11.050035 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:32.097964 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:53.137775 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:07.238334 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:58520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaLH5qj1wV0Si-OkecyCgAAABc"]
[Sun Mar 15 07:34:14.129970 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:35.127355 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:56.137786 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:17.129794 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:33.479003 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.228.16:48604] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaLdZqj1wV0Si-OkecyTgAAAAM"]
[Sun Mar 15 07:35:38.125800 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:59.132796 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:36:21.077807 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:36:42.149833 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:10.120875 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:32.138249 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:53.129956 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:14.138444 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:35.085855 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:56.128359 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:07.943883 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.244.31:38106] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaMS3jZBu2q05ozVU-uzwAAAUU"]
[Sun Mar 15 07:39:17.057863 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:38.121800 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:59.115638 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:20.681813 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:42.126529 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:56.734911 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.228.16:45956] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaMuJqj1wV0Si-Okecy6QAAABU"]
[Sun Mar 15 07:41:03.568098 2026] [access_compat:error] [pid 21946:tid 140411641214720] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Sun Mar 15 07:41:03.746586 2026] [access_compat:error] [pid 21946:tid 140411565680384] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/style.php
[Sun Mar 15 07:41:03.935029 2026] [access_compat:error] [pid 21946:tid 140411590858496] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/themes/style.php
[Sun Mar 15 07:41:04.049838 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:41:04.117191 2026] [access_compat:error] [pid 21805:tid 140411607643904] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/style.php
[Sun Mar 15 07:41:04.335833 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/style.php
[Sun Mar 15 07:41:04.517066 2026] [access_compat:error] [pid 21805:tid 140411548894976] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/chosen.php
[Sun Mar 15 07:41:04.695428 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Sun Mar 15 07:41:04.878817 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/flower.php
[Sun Mar 15 07:41:05.057197 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gifclass.php
[Sun Mar 15 07:41:05.235508 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bless.php
[Sun Mar 15 07:41:05.415389 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/class-t.api.php
[Sun Mar 15 07:41:05.595154 2026] [access_compat:error] [pid 21533:tid 140411632822016] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/blurbs.php
[Sun Mar 15 07:41:05.774849 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akcc.php
[Sun Mar 15 07:41:05.953652 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/abcd.php
[Sun Mar 15 07:41:06.133787 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/shelp.php
[Sun Mar 15 07:41:06.315200 2026] [access_compat:error] [pid 21806:tid 140411590858496] [client 104.28.246.115:51308] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cord.php
[Sun Mar 15 07:41:06.494160 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 104.28.246.115:51308] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dex.php
[Sun Mar 15 07:41:25.117785 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:41:46.035444 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:07.125819 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:31.092905 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:54.494935 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:16.061883 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:37.041803 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:58.110016 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:44:19.069816 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:44:36.247118 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:45776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaNlNSswJuvopo3lOi_xgAAAIE"]
[Sun Mar 15 07:44:40.133837 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:01.137848 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:22.125788 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:43.149831 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:03.814175 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:43230] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaN63jZBu2q05ozVU-vqAAAAVE"]
[Sun Mar 15 07:46:04.122355 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:25.125786 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:46.058262 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:07.055601 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:28.120850 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:52.161334 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:48:14.113985 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:48:38.524217 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:00.057851 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:21.133846 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:38.034434 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:51830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaOwnbQATo66fKoS7ygMAAAAMM"]
[Sun Mar 15 07:49:42.121830 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:03.118181 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:24.125789 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:45.117815 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:06.128776 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:27.121834 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:48.126869 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:09.069813 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:31.069894 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:52.153795 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:53:13.097847 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:53:36.089940 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:00.125822 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:21.085815 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:42.085827 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:03.130221 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:24.117785 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:45.137812 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:06.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:27.122391 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:49.125800 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:10.104476 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:31.127024 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:52.129814 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:13.057838 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:34.121864 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:58.133814 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:59:21.129873 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:59:42.129786 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:03.336571 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:25.129038 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:46.117874 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:07.126514 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:28.129797 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:48.930954 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:55972] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaRnNSswJuvopo3lOjCHgAAAIw"]
[Sun Mar 15 08:01:49.113141 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:10.125808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:31.133790 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:52.132575 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:13.129760 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:34.033909 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:55.123088 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:04:20.129815 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:04:42.125807 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:04.193896 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:25.059018 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:33.205800 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:36286] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaSfXjZBu2q05ozVU-yLQAAAVc"]
[Sun Mar 15 08:05:46.130495 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:07.125843 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:28.060767 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:49.065929 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:57.565396 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:44122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaS0XbQATo66fKoS7yibAAAAMI"]
[Sun Mar 15 08:07:10.091919 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:07:34.153843 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:07:55.117862 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:16.121266 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:38.093863 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:59.057850 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:09:20.273801 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:09:42.121952 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:03.133821 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:24.160319 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:41.204577 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.244.31:38048] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaTsdSswJuvopo3lOjDWAAAAIc"]
[Sun Mar 15 08:10:45.121671 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:10.125818 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:31.129869 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:52.057820 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:13.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:21.859693 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:60024] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaUFbABkC4fWIHEf8FJUgAAAFE"]
[Sun Mar 15 08:12:34.133814 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:55.129927 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:16.145804 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:37.125805 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:59.390110 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:14:21.125821 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:14:42.134006 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:04.125929 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:25.129808 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:46.141776 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:05.304650 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:47342] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaU9XjZBu2q05ozVU-zowAAAUY"]
[Sun Mar 15 08:16:08.125822 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:29.057830 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:50.131671 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:11.129813 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:32.121793 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:33.052056 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.228.16:35836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaVTXjZBu2q05ozVU-z4gAAAUI"]
[Sun Mar 15 08:17:53.133877 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:14.121224 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:35.137830 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:56.041806 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:17.073861 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:38.053791 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:59.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:20:21.069878 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:20:42.134573 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:03.117780 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:11.663314 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:47390] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaWJ5qj1wV0Si-Okec5KwAAABU"]
[Sun Mar 15 08:21:24.125809 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:45.036179 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:06.029806 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:28.121788 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:49.129821 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:56.010840 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:51126] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaWkHjZBu2q05ozVU-0tAAAAVU"]
[Sun Mar 15 08:23:10.057903 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:23:31.122637 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:23:52.081829 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:13.121797 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:34.125850 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:55.075111 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:25:17.141829 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:25:39.144775 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:01.133832 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:22.057990 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:27.807633 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:39034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaXY5qj1wV0Si-Okec6CgAAABU"]
[Sun Mar 15 08:26:43.137843 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:06.122214 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:27.121843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:48.130059 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:06.866756 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:56106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaXxnbQATo66fKoS7ylgQAAAM4"]
[Sun Mar 15 08:28:09.121863 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:30.125820 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:51.125806 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:12.088535 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:34.129777 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:55.133787 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:16.125796 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:37.125813 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:59.033930 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:31:20.134665 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:31:34.142660 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:60102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaYlnjZBu2q05ozVU-1-gAAAUY"]
[Sun Mar 15 08:31:42.133828 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:03.493822 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:25.130873 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:47.037925 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:08.123481 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:23.450478 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.228.16:46770] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaZA3jZBu2q05ozVU-2OQAAAUA"]
[Sun Mar 15 08:33:30.085868 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:51.129864 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:12.125781 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:33.041838 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:54.125827 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:16.079241 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:37.085812 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:58.125846 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:36:20.125827 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:36:41.129837 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:02.121337 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:02.146569 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:41084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaZ3rABkC4fWIHEf8FM4QAAAEY"]
[Sun Mar 15 08:37:23.069842 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:44.123788 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:05.041831 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:26.137783 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:30.678525 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:34910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaaNtSswJuvopo3lOjHUQAAAII"]
[Sun Mar 15 08:38:52.127358 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:39:18.125778 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:39:39.127254 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:00.152892 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:22.125878 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:43.124505 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:04.057903 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:26.077940 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:48.185879 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:06.821570 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:39308] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ababDdSswJuvopo3lOjH2QAAAII"]
[Sun Mar 15 08:42:09.057857 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:30.120221 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:51.037947 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:12.125811 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:33.118120 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:47.382473 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.228.16:59308] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ababc9SswJuvopo3lOjIIgAAAJY"]
[Sun Mar 15 08:43:54.033852 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:44:15.125773 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:44:39.125779 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:00.129889 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:21.118330 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:44.101825 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:05.121790 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:26.125788 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:48.133668 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:09.125812 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:21.773404 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:40554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abacSXjZBu2q05ozVU-4LwAAAUQ"]
[Sun Mar 15 08:47:30.061893 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:51.069887 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:12.083113 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:34.121380 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:54.999788 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:53864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abacprABkC4fWIHEf8FOWQAAAEk"]
[Sun Mar 15 08:48:55.128651 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:16.133782 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:37.085825 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:59.121067 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:50:20.134769 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:50:41.121851 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:02.133842 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:23.141811 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:45.025810 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:07.132903 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:22.913770 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.244.31:50250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaddpqj1wV0Si-Okec-ZAAAAAE"]
[Sun Mar 15 08:52:28.047444 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:49.125821 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:10.084499 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:36.141946 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:57.113833 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:54:18.126307 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:54:39.128268 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:01.129734 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:22.113860 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:43.116024 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:04.121848 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:26.126998 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:47.134791 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:09.121824 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:34.361817 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:56.066265 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:17.157873 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:38.133829 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:59.085820 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:59:20.125792 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:59:41.131751 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:02.158189 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:23.138611 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:44.057814 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:06.057876 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:28.132446 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:49.125782 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:11.120166 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:32.123799 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:54.137806 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:15.118336 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:36.133873 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:58.120259 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:19.121828 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:40.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:44.651578 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:45134] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abagXHbQATo66fKoS7yrfwAAAMo"]
[Sun Mar 15 09:05:01.133781 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:05:24.127058 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:05:46.125814 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:07.033923 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:28.094216 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:50.133790 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:11.125815 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59214] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:33.065884 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:54.101930 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:14.562985 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:34374] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abahLnbQATo66fKoS7ysAwAAAMU"]
[Sun Mar 15 09:08:15.125878 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:36.129862 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:57.031539 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:19.125232 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:40.121793 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:46.440286 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.228.16:47190] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abahinjZBu2q05ozVU-7ZwAAAUc"]
[Sun Mar 15 09:10:01.129816 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32894] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:10:26.125760 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:10:47.041816 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:08.177836 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:29.137761 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:50.129809 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:12.137933 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:33.041886 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:55.061819 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:16.121871 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:17.760857 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.244.31:44678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaiXdSswJuvopo3lOjMvAAAAI4"]
[Sun Mar 15 09:13:37.129795 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:58.133793 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:14:19.125950 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:14:40.620256 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36338] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:02.173815 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36568] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:13.049262 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:53196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abai0XbQATo66fKoS7ytOgAAAMA"]
[Sun Mar 15 09:15:23.097846 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:44.047573 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:05.133800 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:26.124020 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:47.137784 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:09.381980 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:31.097909 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:52.809932 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:15.060170 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:36.165782 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:43.939542 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.244.31:55128] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abajo7ABkC4fWIHEf8FTQQAAAFI"]
[Sun Mar 15 09:18:57.063701 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:19:18.045809 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:19:40.129796 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:01.033872 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:20.110398 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:48620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abakBHbQATo66fKoS7yt8QAAAMQ"]
[Sun Mar 15 09:20:22.134874 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:43.053843 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:04.129781 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:26.125831 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:47.070147 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:08.093879 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:30.095950 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:51.131146 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:12.138664 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:34.109837 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:48.957359 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:59820] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abak1Jqj1wV0Si-OkedDqQAAABE"]
[Sun Mar 15 09:23:55.069811 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:16.133813 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:37.125780 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:58.121799 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:25:19.121770 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:25:37.118485 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:33662] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abalQdSswJuvopo3lOjOqwAAAII"]
[Sun Mar 15 09:25:40.117504 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:01.133792 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:22.133792 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:43.133889 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:05.137771 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:26.154032 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:47.133785 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:09.253772 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:31.985861 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:54.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:10.532863 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.244.31:40348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abamFnbQATo66fKoS7yvqAAAAMw"]
[Sun Mar 15 09:29:16.131416 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:37.137754 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:58.125818 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:19.133853 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48404] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:40.099610 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:44.430874 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.228.16:58492] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abamdJqj1wV0Si-OkedFFgAAAAQ"]
[Sun Mar 15 09:31:01.153801 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:31:22.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:31:43.141851 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:04.125783 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:25.073805 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:46.143449 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:07.057929 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:29.071067 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:50.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:12.033820 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:14.608921 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:52834] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abanRtSswJuvopo3lOjP9gAAAIw"]
[Sun Mar 15 09:34:33.057863 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:54.121793 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:15.150091 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52874] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:37.129840 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:59.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:36:06.527996 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:34878] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abanttSswJuvopo3lOjQSwAAAIY"]
[Sun Mar 15 09:36:21.125775 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:36:42.137811 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:03.153855 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:24.129794 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:45.125832 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:06.133788 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:27.136897 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:48.149802 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:09.150879 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:31.141793 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:39.034919 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:34126] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaoi7ABkC4fWIHEf8FWeQAAAFE"]
[Sun Mar 15 09:39:52.137846 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:13.126081 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:34.137767 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:59.646502 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:41:12.618554 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:55268] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abao6Jqj1wV0Si-OkedG6QAAAAo"]
[Sun Mar 15 09:41:23.109625 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:41:45.128251 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:06.115422 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:27.121857 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:48.125781 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:09.121780 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:31.125809 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:52.776990 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:14.137797 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:36.151837 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:46.279612 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.244.31:58864] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abapvpqj1wV0Si-OkedHawAAAA0"]
[Sun Mar 15 09:44:57.057868 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:45:18.119373 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:45:39.102973 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:01.135879 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:22.117773 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:34.880221 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.228.16:33098] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaqKnbQATo66fKoS7yyKAAAAME"]
[Sun Mar 15 09:46:43.133796 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33490] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:04.053871 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:25.129825 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:46.121862 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:07.146960 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:28.123104 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:50.129910 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:11.137856 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:32.129802 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:54.125793 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:13.600131 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.244.31:51152] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abarBXjZBu2q05ozVU_BmAAAAVQ"]
[Sun Mar 15 09:50:15.137878 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:37.398017 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:59.086076 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:51:20.129058 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:51:26.578405 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 20.17.162.97:35510] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/index.php5, referer: binance.com
[Sun Mar 15 09:51:37.613325 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.228.16:37006] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abarWZqj1wV0Si-OkedIUQAAABU"]
[Sun Mar 15 09:51:41.129930 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:02.141816 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:23.101860 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:44.045805 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:05.065841 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:26.139201 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:47.129802 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:09.141795 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:30.128012 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:51.137816 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:13.052409 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:35.121806 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:56.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:17.121008 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:22.003775 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.244.31:45298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abasdtSswJuvopo3lOjTKwAAAJI"]
[Sun Mar 15 09:56:38.125906 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:59.061828 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:57:20.128580 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:57:41.061944 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41146] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:02.045830 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:23.129129 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:44.129795 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:06.125831 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:27.129897 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:48.125869 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:09.033981 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:31.133812 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:52.127344 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:13.133828 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:34.129170 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:56.105893 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:17.131918 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:38.129846 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:59.121916 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:03:20.118393 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:03:41.033860 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:03.121811 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:25.141847 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:46.045953 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:07.137789 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:28.109800 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:50.133774 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:11.141794 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:33.129803 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:55.076680 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:16.129806 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:32.814923 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:35814] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abavFNSswJuvopo3lOjVSAAAAI0"]
[Sun Mar 15 10:07:37.046022 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:58.125778 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49518] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:08:19.049848 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:08:40.137788 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:01.057811 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:23.059868 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:44.130506 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:05.141789 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:26.133804 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:47.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:09.073892 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52168] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:30.133817 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:54.125909 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:55.791193 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:45518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abawG9SswJuvopo3lOjV7QAAAII"]
[Sun Mar 15 10:12:19.137807 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:12:40.038902 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:59546] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abawSHjZBu2q05ozVU_FXAAAAVQ"]
[Sun Mar 15 10:12:41.036526 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:02.118492 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:23.125869 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:44.072932 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:05.137906 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:26.121191 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:47.113830 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:08.137841 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:29.129819 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:50.129846 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:12.145896 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:33.133815 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:54.087958 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:15.121817 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:18.914717 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:60138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaxXnjZBu2q05ozVU_GJAAAAUM"]
[Sun Mar 15 10:17:40.122456 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:58.054770 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.228.16:60296] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaxhnjZBu2q05ozVU_GQwAAAU8"]
[Sun Mar 15 10:18:02.133890 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:18:24.125786 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:18:45.121804 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:06.137800 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:27.125886 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:48.134281 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:09.045807 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:30.126754 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:51.080490 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:12.161867 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:34.121766 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:55.134675 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:22:16.120278 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:22:29.895219 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:49540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaylZqj1wV0Si-OkedOYQAAABA"]
[Sun Mar 15 10:22:37.129803 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:01.127825 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:12.038726 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.228.16:45958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaywNSswJuvopo3lOjX0wAAAIM"]
[Sun Mar 15 10:23:22.129825 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:45.121808 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:07.061891 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:28.137837 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:49.685858 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:11.125983 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:32.101891 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:53.135732 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:15.125835 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:37.133800 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:58.129791 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:27:19.066536 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:27:40.135254 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:00.523903 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:33608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaz4Jqj1wV0Si-OkedPPAAAABc"]
[Sun Mar 15 10:28:01.121836 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:23.148410 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:34.639732 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:37156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba0AtSswJuvopo3lOjYkgAAAIw"]
[Sun Mar 15 10:28:45.153780 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:06.125841 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:29.125801 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38864] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:50.129839 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:11.135998 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:32.119128 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:53.141784 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:14.037840 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:35.126692 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:59.129807 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:32:20.134339 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:32:41.125844 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:02.125837 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:09.762088 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.244.31:36148] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba1FXjZBu2q05ozVU_IkwAAAU8"]
[Sun Mar 15 10:33:23.099935 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:38.879654 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:42502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba1MrABkC4fWIHEf8FewAAAAEY"]
[Sun Mar 15 10:33:44.124265 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:06.133781 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:28.129780 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:49.125829 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:11.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:32.132505 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:53.109909 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:14.125817 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:36.344355 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:58.125771 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:37:21.116168 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:37:42.129984 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45214] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:03.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:25.120673 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45728] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:31.955710 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:33186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba2V9SswJuvopo3lOjaGgAAAJM"]
[Sun Mar 15 10:38:47.383178 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:55.790104 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.228.16:47354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba2b3bQATo66fKoS7y6_AAAANI"]
[Sun Mar 15 10:39:09.122432 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:39:30.129846 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:39:52.105817 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:13.126825 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47160] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:34.113774 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:55.094444 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:16.071102 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:37.125771 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:59.110771 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:42:21.133873 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:42:45.124667 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:06.121962 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:27.137176 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:48.069824 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:02.506651 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:44016] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba3onbQATo66fKoS7y7sgAAAMo"]
[Sun Mar 15 10:44:09.125069 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:31.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:52.127366 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:53.803177 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.244.31:40250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba31XbQATo66fKoS7y71AAAANQ"]
[Sun Mar 15 10:45:14.120827 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:45:36.133773 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:45:57.126610 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:46:18.117839 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:46:39.141805 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:01.143922 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:22.153874 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:43.121280 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:07.120917 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:28.133832 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:49.037925 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:10.033950 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:23.645533 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:35068] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba449SswJuvopo3lOjblwAAAIU"]
[Sun Mar 15 10:49:31.117795 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53914] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:52.141793 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:05.638362 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.244.31:59376] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba5DHjZBu2q05ozVU_KswAAAUo"]
[Sun Mar 15 10:50:13.125795 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:35.129824 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:57.121807 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:51:18.069413 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:51:40.025803 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:01.057828 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:22.129793 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:43.129867 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56168] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:04.133950 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:26.125830 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:50.561832 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:12.098543 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:33.136560 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:34.440587 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.228.16:49206] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba6GnbQATo66fKoS7y9LwAAAM8"]
[Sun Mar 15 10:54:54.125857 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:15.122099 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:24.284550 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:53208] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba6THbQATo66fKoS7y9UAAAANc"]
[Sun Mar 15 10:55:36.126042 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:57.143320 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:56:18.133785 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:56:39.121778 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:02.126454 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:23.126024 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:44.129824 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59584] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:05.133839 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:26.125847 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:48.133878 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:10.129794 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:33.129785 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:54.661813 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:00:16.137770 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:00:26.614675 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:32768] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba7ebABkC4fWIHEf8FiywAAAFY"]
[Sun Mar 15 11:00:38.125823 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:00.133843 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:22.121922 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:44.136247 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:06.102246 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:27.578137 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:49.133817 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:10.126584 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:31.133775 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:53.125811 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:14.077939 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:35.097821 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:56.129828 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:05:17.125793 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:05:39.062833 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:00.129809 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:22.146690 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:43.065815 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:06.129825 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:27.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:48.126975 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:10.081818 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:31.117808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:52.117830 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:15.129906 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:36.045874 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:57.133826 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:10:18.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:10:30.634813 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.228.16:48114] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba91nbQATo66fKoS7zALAAAANY"]
[Sun Mar 15 11:10:39.120792 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:00.141826 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:22.133795 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:43.133772 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:05.125884 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:33.131957 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:55.125906 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:13:16.085850 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:13:39.129975 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:00.129779 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:22.125779 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:43.033841 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:04.131308 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:25.067891 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:37.770567 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.228.16:58078] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba_CZqj1wV0Si-OkedW3wAAAAA"]
[Sun Mar 15 11:15:46.131029 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:07.151664 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:27.141169 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.244.31:33768] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba_OnbQATo66fKoS7zBJAAAAMI"]
[Sun Mar 15 11:16:28.132565 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:49.121800 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:10.084987 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:31.133766 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:54.039759 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:18:15.133800 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:18:38.033846 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:01.125796 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:22.091537 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:44.049920 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:05.127908 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:26.133846 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:47.120654 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:04.383176 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:43964] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbAT3bQATo66fKoS7zB3QAAANc"]
[Sun Mar 15 11:21:08.133805 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:29.125778 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:34.337447 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.244.31:54720] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbAbrABkC4fWIHEf8FmYgAAAE0"]
[Sun Mar 15 11:21:50.057866 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:11.153880 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:32.133779 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51974] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:53.125816 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:15.125790 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:36.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:59.079958 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:24:24.130103 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53404] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:24:47.133871 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:08.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:29.045892 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:50.853905 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:08.111232 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.228.16:37002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbBgHbQATo66fKoS7zCgwAAAMs"]
[Sun Mar 15 11:26:12.134105 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:34.045979 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:55.120246 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:00.632376 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.244.31:43376] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbBtHjZBu2q05ozVU_QuwAAAUw"]
[Sun Mar 15 11:27:16.120502 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:37.104640 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:58.129770 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:28:20.121807 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:28:41.137796 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:02.121897 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:23.137830 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:46.125944 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:08.045841 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:29.125796 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:50.135353 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:12.441859 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:29.086344 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:57572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbCwXbQATo66fKoS7zDOgAAAMU"]
[Sun Mar 15 11:31:34.129816 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:56.041914 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:10.754475 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:41696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbC6rABkC4fWIHEf8FnxAAAAEE"]
[Sun Mar 15 11:32:17.130953 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:38.117865 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:59.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:33:21.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:33:42.081819 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:03.045839 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:24.125807 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:45.129809 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:06.137811 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:30.145771 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:51.057872 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:12.121958 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:33.125806 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:40.178840 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:55526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbD-Jqj1wV0Si-OkedZvAAAAAg"]
[Sun Mar 15 11:36:55.057881 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:16.125784 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:38.149959 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:38.991530 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.244.31:35698] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbEMrABkC4fWIHEf8FoiAAAAEg"]
[Sun Mar 15 11:38:00.257815 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:38:22.053902 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:38:43.121909 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:04.153822 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:25.131394 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:46.982969 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:08.121822 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:29.133777 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:52.121199 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:13.125790 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:34.152291 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:55.134373 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:01.310600 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:48506] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbFOXjZBu2q05ozVU_SuQAAAUQ"]
[Sun Mar 15 11:42:16.137780 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:37.121846 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:42.352564 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.244.31:36920] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbFYnbQATo66fKoS7zE2wAAANY"]
[Sun Mar 15 11:42:59.094014 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:43:20.098203 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:43:43.112436 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:04.128912 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:29.117806 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:50.129827 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:12.133793 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:35.113832 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:57.054668 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:46:19.060005 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:46:40.211176 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:01.121794 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:09.949981 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:45734] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbGbdSswJuvopo3lOjkowAAAI0"]
[Sun Mar 15 11:47:22.130040 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:43.125940 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:04.338308 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:50462] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbGpHbQATo66fKoS7zFqAAAAMM"]
[Sun Mar 15 11:48:04.463959 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:26.129801 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:47.093856 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43344] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:08.060114 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:29.137502 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:50.082824 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:11.517854 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:33.137963 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:56.181890 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:51:19.095044 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:51:41.133851 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:02.121817 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:23.133856 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:38.494905 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:43866] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbHtpqj1wV0Si-Okedc5wAAAAg"]
[Sun Mar 15 11:52:44.121260 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:05.131926 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:05.570010 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:55426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbH0bABkC4fWIHEf8Fq6wAAAFE"]
[Sun Mar 15 11:53:26.134136 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:47.125986 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:08.097800 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:29.111729 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:50.041982 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:11.129943 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:32.130623 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:54.137826 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:56:17.149870 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:56:39.121825 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:02.033896 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:23.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:44.125778 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:05.125780 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:26.122136 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:35.546814 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:41810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbJG9SswJuvopo3lOjmVwAAAIA"]
[Sun Mar 15 11:58:45.602476 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:58676] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbJJbABkC4fWIHEf8Fr7AAAAE4"]
[Sun Mar 15 11:58:48.121051 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:10.125787 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:31.125864 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:53.135284 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:14.130741 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:35.121200 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:56.126983 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:01:17.121802 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:01:38.118714 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:01.129804 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:24.109935 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:45.133828 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:07.133804 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:28.121853 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:37.826997 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.244.31:51694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbKSXbQATo66fKoS7zH6wAAANU"]
[Sun Mar 15 12:03:50.124271 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:11.129787 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:32.117841 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:53.137946 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:14.137969 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:36.133847 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:39.163692 2026] [autoindex:error] [pid 21946:tid 140411624429312] [client 167.172.93.181:54804] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive, referer: binance.com
[Sun Mar 15 12:05:57.125912 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:06:18.134036 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:06:39.125824 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:00.137785 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:23.138363 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:45.445855 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:07.137837 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:28.168043 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:49.125832 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:11.127427 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:32.113894 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:53.129936 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:14.041833 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:35.077935 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59620] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:57.095911 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:11:18.119695 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:11:39.129827 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:00.037826 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:22.132163 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:45.122093 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:07.106696 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:28.105813 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:50.125771 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:11.105900 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:27.859063 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:33094] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbM09SswJuvopo3lOjoZQAAAIY"]
[Sun Mar 15 12:14:32.133842 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:54.127245 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:15:17.453964 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:15:39.131820 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:01.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:22.057830 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:43.129776 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:04.129798 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:25.121850 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:47.101783 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] [client 179.188.53.243:36698] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:17:47.101828 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:36698] AH01075: Error dispatching request to :
[Sun Mar 15 12:18:08.133809 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:18:29.097968 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:18:51.124672 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:12.129774 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:33.126906 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:34.324009 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.244.31:36610] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbOBnbQATo66fKoS7zKPAAAAMc"]
[Sun Mar 15 12:19:54.121783 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:54.403426 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:58788] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbOGrABkC4fWIHEf8FvIAAAAFc"]
[Sun Mar 15 12:20:15.126536 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:20:38.126140 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:00.129888 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:22.133776 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:43.121857 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:04.033818 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:25.126566 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:47.106172 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] [client 179.188.53.243:40780] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:22:47.106224 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:40780] AH01075: Error dispatching request to :
[Sun Mar 15 12:23:09.141905 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:23:31.129827 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:23:52.121802 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:13.121803 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:35.125852 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:40.313756 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:46386] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbPONSswJuvopo3lOjqLQAAAIY"]
[Sun Mar 15 12:24:56.137815 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:17.141801 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:38.127523 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:59.130774 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:26:06.979976 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:60502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbPjtSswJuvopo3lOjqWQAAAJE"]
[Sun Mar 15 12:26:21.267589 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:26:43.049816 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:04.121802 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:25.125024 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:46.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:08.085880 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:30.033911 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:53.085884 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:14.045832 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:35.133801 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:56.137807 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:30:11.090412 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.244.31:35830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbQgXbQATo66fKoS7zMSwAAAM4"]
[Sun Mar 15 12:30:18.125821 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:30:39.053808 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:02.141833 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:10.804440 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:41648] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbQvnjZBu2q05ozVU_ZngAAAUg"]
[Sun Mar 15 12:31:23.121844 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:44.133837 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:05.097827 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:26.117852 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:54.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:33:15.069873 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:35:18.582178 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:33892] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbRtpqj1wV0Si-OkedkOgAAABE"]
[Sun Mar 15 12:35:45.126912 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:36:07.119152 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] [client 179.188.53.243:51668] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:36:07.119189 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:51668] AH01075: Error dispatching request to :
[Sun Mar 15 12:36:28.125849 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:36:28.585235 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:58684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbR_HjZBu2q05ozVU_aTQAAAUw"]
[Sun Mar 15 12:36:49.133813 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:10.085807 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:31.121814 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:53.121836 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:14.122031 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:35.069830 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:56.125871 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:17.065814 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:38.137780 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:59.122092 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:20.069887 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:41.153833 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:46.954579 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.244.31:51418] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbS_nbQATo66fKoS7zNkQAAANY"]
[Sun Mar 15 12:41:03.057829 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:41:25.131783 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:41:42.455589 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:51576] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbTNtSswJuvopo3lOjsgwAAAJM"]
[Sun Mar 15 12:41:46.141766 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:07.142569 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:28.057813 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:49.125814 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:10.069842 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:31.125842 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:54.101781 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:15.134705 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:36.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:57.041837 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:18.041799 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:39.048182 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:49.194463 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:56704] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbULbABkC4fWIHEf8FyiwAAAEs"]
[Sun Mar 15 12:46:03.125809 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:28.329807 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:50.125827 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:56.962750 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.228.16:52586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbUcNSswJuvopo3lOjtTwAAAJQ"]
[Sun Mar 15 12:47:11.131070 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:47:32.121864 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:47:53.144714 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:14.167917 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:35.130291 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:56.129780 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:49:17.121858 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:49:38.065878 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:00.145800 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:22.345791 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:44.121335 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:06.121821 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:13.963358 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:45348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbVcbABkC4fWIHEf8FzLwAAAE4"]
[Sun Mar 15 12:51:27.122223 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:49.123204 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:11.021817 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:12.589196 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:32832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbVrHbQATo66fKoS7zPOwAAAMo"]
[Sun Mar 15 12:52:33.041813 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:54.089928 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:15.121881 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:36.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:57.124479 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:54:19.118509 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:54:41.138156 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:02.173802 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:23.041793 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:44.121788 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:06.102788 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:24.738145 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.244.31:34486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbWqHbQATo66fKoS7zP5wAAANU"]
[Sun Mar 15 12:56:27.129570 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:48.069827 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:11.122380 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:28.529833 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:40012] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbW6HbQATo66fKoS7zQAgAAANc"]
[Sun Mar 15 12:57:32.069831 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:53.057858 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:14.122789 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:36.135807 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:58.129798 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:59:19.131274 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:59:40.150293 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:01.126966 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:23.128232 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:44.125792 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:06.129787 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:28.118013 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:43.853405 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:34190] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbX59SswJuvopo3lOjvGwAAAIo"]
[Sun Mar 15 13:01:49.053843 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:11.122757 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:33.121830 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:55.124591 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:16.145806 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:37.137910 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:39.465829 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:56800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbYW7ABkC4fWIHEf8F0yAAAAFc"]
[Sun Mar 15 13:03:58.118163 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:04:19.121803 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:04:40.119497 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:01.137806 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:23.117820 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:44.032165 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:05.134119 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:27.145808 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:48.131330 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:54.921343 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.244.31:59496] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbZHrABkC4fWIHEf8F1EwAAAEc"]
[Sun Mar 15 13:07:10.131245 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:07:32.121934 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:07:56.341851 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:08:18.070374 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46726] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:08:39.105845 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:01.099995 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:22.117814 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:43.129854 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:04.137917 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:25.825812 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:48.257781 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:09.033925 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:30.121847 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:51.139744 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:12.130253 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:33.057901 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:54.125770 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:13:16.132190 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:13:37.033856 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:00.049803 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:23.069843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:44.129816 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:05.121687 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:26.119246 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:47.129778 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:10.126498 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:31.045841 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:52.137768 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:13.133782 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:34.121857 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:56.061861 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:18:18.126871 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:18:39.117817 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:00.135864 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:12.331231 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.228.16:58458] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbb_5qj1wV0Si-OkedqMQAAABA"]
[Sun Mar 15 13:19:21.121788 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:44.129033 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:06.123074 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:27.449799 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:49.037877 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:10.090955 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:31.129895 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:53.121806 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:20.141864 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:41.137999 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:51.386758 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:59446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbc29SswJuvopo3lOjxXAAAAIY"]
[Sun Mar 15 13:23:02.144939 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:23:24.126730 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:23:45.111090 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:06.127184 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:27.126076 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:28.205939 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.228.16:35170] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbdPHbQATo66fKoS7zTAAAAANM"]
[Sun Mar 15 13:24:49.117822 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:11.108541 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:32.169868 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:54.129777 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:15.113690 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:36.125198 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:57.129830 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:18.121774 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:39.130957 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:58.427848 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:44764] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbeDnjZBu2q05ozVU_gTgAAAUY"]
[Sun Mar 15 13:28:02.128440 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:28:24.045858 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:28:46.082350 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:07.122149 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:28.122149 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:35.235738 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:54094] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbeb3bQATo66fKoS7zT0gAAAMA"]
[Sun Mar 15 13:29:49.129873 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:10.121984 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:33.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:54.066005 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:16.230177 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:37.497225 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:59.123302 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:20.126860 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:41.125771 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:57.448387 2026] [access_compat:error] [pid 21946:tid 140411666392832] [client 4.239.241.168:60712] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:32:57.728915 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 4.239.241.168:57680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:33:02.138321 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:33:23.129807 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:33:23.983539 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:34656] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbfU7ABkC4fWIHEf8F4ywAAAEI"]
[Sun Mar 15 13:33:45.122817 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:08.105825 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:29.668820 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:51.121894 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:04.867482 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.228.16:57602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbfuHjZBu2q05ozVU_hPQAAAVI"]
[Sun Mar 15 13:35:12.121775 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:34.129225 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:55.149806 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:36:17.780977 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:36:39.122230 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:00.131677 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:21.049828 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:27.734193 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 4.239.241.168:61439] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:37:28.145430 2026] [access_compat:error] [pid 21533:tid 140411683178240] [client 4.239.241.168:60922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:37:42.058090 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:05.117784 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:28.129806 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:28.567261 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.244.31:35514] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbghHjZBu2q05ozVU_hvAAAAVI"]
[Sun Mar 15 13:38:49.057769 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:11.049927 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:29.485132 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 4.239.241.168:53832] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:29.743886 2026] [access_compat:error] [pid 11972:tid 140411624429312] [client 4.239.241.168:34454] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:33.422789 2026] [access_compat:error] [pid 21805:tid 140411741927168] [client 4.239.241.168:53832] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:33.451280 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:35.107312 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 4.239.241.168:34512] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:55.093876 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:40:10.615894 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.228.16:42108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbg6nbQATo66fKoS7zVnAAAAMs"]
[Sun Mar 15 13:40:16.125896 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:40:38.121781 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:41:00.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:41:30.121807 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:01.157795 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37258] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:25.112779 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:46.045996 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:07.133848 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:28.125897 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:52.121975 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:54.547622 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:42072] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbhytSswJuvopo3lOj0fgAAAIo"]
[Sun Mar 15 13:44:14.693811 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:44:37.117863 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:44:59.133801 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:45:21.104094 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:45:30.926298 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:36168] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbiKnjZBu2q05ozVU_ivQAAAVA"]
[Sun Mar 15 13:45:42.712554 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:04.121250 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:26.129768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:51.093180 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:47:22.125793 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:47:50.126289 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:11.121828 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:32.127330 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:54.122483 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:03.240743 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.244.31:35060] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbi_7ABkC4fWIHEf8F6vQAAAEQ"]
[Sun Mar 15 13:49:16.045841 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:37.133841 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:58.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:50:20.045800 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:50:42.834848 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:57708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbjYrABkC4fWIHEf8F62AAAAEk"]
[Sun Mar 15 13:50:43.155618 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:04.125794 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:25.127978 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:46.125780 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:52:12.033909 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:52:40.125813 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:09.125821 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:32.125819 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:55.122555 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:16.129837 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:20.446892 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:53462] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbkPNSswJuvopo3lOj1iQAAAJg"]
[Sun Mar 15 13:54:38.125809 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:59.125859 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44536] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:55:20.132065 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:55:42.123211 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:06.081881 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:09.315262 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:35496] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbkqbABkC4fWIHEf8F7lgAAAEs"]
[Sun Mar 15 13:56:27.126897 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:48.107659 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:57:10.121837 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:57:34.127043 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45540] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:02.033890 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:30.114685 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:54.121916 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:59:17.161793 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:59:30.238403 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:47368] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abblctSswJuvopo3lOj2VAAAAIM"]
[Sun Mar 15 13:59:39.125833 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:00.131302 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:21.129796 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:42.902154 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:04.125802 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:13.806147 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:39960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbl2dSswJuvopo3lOj2jAAAAIQ"]
[Sun Mar 15 14:01:28.049887 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:50.131429 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:11.057830 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:33.033879 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:55.125811 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:03:16.119445 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:03:52.121803 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:16.049870 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:39.089801 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:50.183432 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.244.31:52780] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbmsnbQATo66fKoS7zYYQAAANM"]
[Sun Mar 15 14:05:00.274172 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 78.174.193.63:20518] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Sun Mar 15 14:05:01.129965 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:05:23.129817 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:05:44.127452 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:05.057996 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:26.129672 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:32.119021 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:42128] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbnGLABkC4fWIHEf8F82QAAAEY"]
[Sun Mar 15 14:06:48.132195 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:09.126114 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:30.127793 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:52.132487 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:13.121992 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:34.133833 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:55.125134 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:17.125785 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:39.133789 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:52.657544 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.244.31:40400] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbn4LABkC4fWIHEf8F9LwAAAEg"]
[Sun Mar 15 14:10:00.122920 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:10:24.050162 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:10:46.129815 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:07.057823 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:28.124754 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:49.121859 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:11.337815 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:33.125805 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:54.071674 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:15.125810 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:36.122641 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:57.128427 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:14:18.046172 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:14:39.130848 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:00.141819 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:22.069841 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:46.121876 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:08.141818 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:30.129860 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:51.121816 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:17:32.121814 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:01.121794 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:22.122754 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:43.133822 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:05.141771 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:27.033822 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:48.144284 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:09.125807 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:30.141794 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:52.120864 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:13.128506 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:34.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:56.125836 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:22:17.149799 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:22:18.244908 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:55338] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbqypqj1wV0Si-Okedy6QAAAAo"]
[Sun Mar 15 14:22:53.324274 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:23:15.107108 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:23:44.121805 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:05.136278 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:27.121806 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:48.140826 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:09.129784 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:32.117826 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:43.692610 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:41458] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbrl7ABkC4fWIHEf8F-0QAAAFc"]
[Sun Mar 15 14:25:54.125792 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:16.126124 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:37.123385 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:58.089854 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:27:20.117796 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:27:41.761684 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:55620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbsDZqj1wV0Si-Okedz3wAAAAg"]
[Sun Mar 15 14:27:42.557487 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:28:09.134076 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:28:37.117815 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:06.161914 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:27.109486 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:48.096371 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:09.045813 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:33.129773 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:44.435256 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:51984] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbsxJqj1wV0Si-Oked0PQAAABA"]
[Sun Mar 15 14:30:55.125808 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:31:16.125552 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:31:37.070211 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:00.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:22.041823 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:43.124197 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:47.046632 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:50018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbtP7ABkC4fWIHEf8F_fAAAAE4"]
[Sun Mar 15 14:33:04.124401 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:33:32.125925 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:33:59.125843 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:34:28.145915 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:34:49.118455 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:10.254534 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:31.123997 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:54.133472 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:36:18.113228 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:36:19.504277 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:35426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbuE5qj1wV0Si-Oked1GgAAABg"]
[Sun Mar 15 14:36:39.121249 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:00.121807 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:21.125837 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:44.124136 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:05.033947 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:10.703089 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:33442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbugtSswJuvopo3lOj6OgAAAIQ"]
[Sun Mar 15 14:38:26.132561 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:48.135169 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:39:21.129981 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:39:49.149787 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:11.073849 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:33.121817 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:54.133804 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:41:16.125909 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:41:38.125183 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:00.069827 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:23.121780 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:24.759534 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:42218] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbvgLABkC4fWIHEf8GALgAAAFU"]
[Sun Mar 15 14:42:45.062063 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:07.137803 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:16.409071 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:34320] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbvtLABkC4fWIHEf8GARQAAAFg"]
[Sun Mar 15 14:43:28.129769 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:50.127790 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:44:12.130284 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:44:43.033952 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:10.129914 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:33.126923 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:55.139334 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:46:17.121784 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:46:27.641170 2026] [mime_magic:error] [pid 11972:tid 140411733534464] (70014)End of file found: [client 66.249.74.169:44097] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 14:46:38.077836 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:01.130062 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:23.061848 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:45.130788 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:06.138287 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:27.097835 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:33.108785 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:36666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbw8XjZBu2q05ozVU_o4wAAAUQ"]
[Sun Mar 15 14:48:34.144390 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:37914] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbw8pqj1wV0Si-Oked2YgAAABg"]
[Sun Mar 15 14:48:54.127799 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:49:20.045850 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:49:41.134130 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:02.154836 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:32.129899 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:55.129848 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:16.120585 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:37.129765 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:58.131567 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:52:20.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:52:30.751879 2026] [core:alert] [pid 21805:tid 140411624429312] [client 66.249.74.169:45539] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 14:52:41.125899 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:02.133838 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:23.125519 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:39.290716 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.244.31:33056] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbyI3bQATo66fKoS7zdKgAAAMA"]
[Sun Mar 15 14:53:44.127563 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:44.713160 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:46816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbyKNSswJuvopo3lOj7aQAAAI8"]
[Sun Mar 15 14:54:05.141828 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:54:27.133814 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:54:48.127648 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:10.137808 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:31.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:54.125768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:56:17.124748 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:56:38.152259 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:00.135845 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:22.061950 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:44.131282 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:05.141890 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:27.129817 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:48.069982 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:04.315627 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:37478] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbzaLABkC4fWIHEf8GBgAAAAEM"]
[Sun Mar 15 14:59:09.129859 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:10.513060 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:53756] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbzbtSswJuvopo3lOj8BQAAAI4"]
[Sun Mar 15 14:59:30.125825 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:51.045810 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:13.058996 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:34.138679 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:55.144039 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:01:17.121832 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:01:39.129823 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:00.078396 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:22.044139 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:44.121868 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:05.713830 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:27.123430 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:49.133859 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:08.782832 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:54730] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb0mLABkC4fWIHEf8GB-QAAAE4"]
[Sun Mar 15 15:04:10.056304 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:31.069884 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:52.129926 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:13.121782 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:22.665553 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:41798] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb04rABkC4fWIHEf8GCQAAAAEs"]
[Sun Mar 15 15:05:34.081892 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:56.125771 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:17.129848 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:38.045952 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:59.045857 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:07:20.122993 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:07:42.133891 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:04.141454 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:25.857090 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:47.122076 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56140] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:08.129858 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:31.745859 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:31.978996 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:38444] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb125qj1wV0Si-Oked4ZQAAABU"]
[Sun Mar 15 15:09:53.137630 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:14.130276 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:30.606957 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.228.16:54122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb2FtSswJuvopo3lOj9EAAAAIs"]
[Sun Mar 15 15:10:35.133799 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:57.105919 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:11:18.120357 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:11:39.590180 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:01.120359 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:22.129811 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:43.041934 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:05.121791 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:26.088996 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:47.129858 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:09.075436 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:31.141781 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:41.603917 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:46388] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb3EbABkC4fWIHEf8GDGwAAAFU"]
[Sun Mar 15 15:14:53.065894 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:14.133807 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:36.119463 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:57.069661 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:16:18.134224 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:16:39.121835 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:00.121464 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:21.137789 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:42.133820 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:03.081803 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:25.138579 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:46.140387 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:08.141822 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:30.125906 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:55.124987 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:17.071047 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:29.540261 2026] [core:alert] [pid 11972:tid 140411683178240] [client 66.249.74.169:50689] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 15:20:38.123720 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:59.137093 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:21:20.261830 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:21:41.128835 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:03.069874 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:24.128365 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:45.118513 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:06.124210 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:28.129894 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:49.133772 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:10.053065 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:31.057901 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:52.045852 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:25:17.133816 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:25:39.126504 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:00.134910 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:07.538509 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.244.31:50554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb5v5qj1wV0Si-Oked6UAAAAAg"]
[Sun Mar 15 15:26:16.457296 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.228.16:55942] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb5yHbQATo66fKoS7zg1wAAANE"]
[Sun Mar 15 15:26:23.133833 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36974] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:44.129896 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:05.119983 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:32.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:53.125810 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:14.061859 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:36.072844 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:57.129204 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:29:18.125786 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:29:39.121717 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:00.137846 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:21.129071 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:42.126601 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:03.128304 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:13.909831 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.244.31:50664] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb68XbQATo66fKoS7zhhQAAANA"]
[Sun Mar 15 15:31:20.091812 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:51218] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb6-HjZBu2q05ozVU_swwAAAUg"]
[Sun Mar 15 15:31:24.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:45.137770 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:07.129806 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:29.045828 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:54.042007 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:33:16.129774 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:33:38.129860 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:00.141862 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:22.133837 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:43.131293 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:04.132546 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:26.133779 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:47.021817 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:08.129814 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:29.133372 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:32.010050 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:47170] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb8MHjZBu2q05ozVU_tWAAAAUM"]
[Sun Mar 15 15:36:43.279568 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.228.16:55156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb8O9SswJuvopo3lOj_wAAAAIg"]
[Sun Mar 15 15:36:50.129855 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:11.129790 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:33.121929 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:54.137814 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:38:16.081837 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:38:38.125784 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:01.129826 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:23.122007 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:44.139582 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:05.153774 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:27.127885 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:48.134654 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:09.129910 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:30.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:52.045945 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:55.652429 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.228.16:45836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb9c3bQATo66fKoS7zitwAAAMg"]
[Sun Mar 15 15:42:14.113970 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:42:35.122235 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:42:37.578939 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:59004] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb9nZqj1wV0Si-Oked8OgAAABg"]
[Sun Mar 15 15:42:57.262079 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:43:18.120972 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:43:39.125862 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:01.125854 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:23.137817 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:46.133899 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:07.042820 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:28.129848 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:50.134926 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:11.129897 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:32.148692 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:54.122018 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:15.129831 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:18.270254 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:48196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb-trABkC4fWIHEf8GGNQAAAFE"]
[Sun Mar 15 15:47:36.129896 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:57.127755 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:48:18.113847 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:48:40.100398 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:02.138349 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:23.129830 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:45.125837 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:11.129808 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:33.081977 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51124] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:55.157805 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:16.130025 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:37.133812 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:58.045909 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:52:19.208572 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.228.16:35296] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb_45qj1wV0Si-Oked9ZAAAAA0"]
[Sun Mar 15 15:52:20.130384 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:52:41.126510 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:02.132009 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:05.034963 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:57446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcAEXjZBu2q05ozVU_vcgAAAUk"]
[Sun Mar 15 15:53:23.133909 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:44.123217 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:10.085910 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:31.137865 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:53.129820 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:14.133860 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:35.129843 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:56.125811 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:56:18.125872 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:56:40.128122 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:01.105822 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:22.129783 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:44.112923 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:47.254957 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:41424] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcBK7ABkC4fWIHEf8GHXgAAAE8"]
[Sun Mar 15 15:58:05.057895 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:58:09.728225 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:39240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcBQZqj1wV0Si-Oked-FQAAABU"]
[Sun Mar 15 15:58:26.085829 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:58:47.117876 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55620] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:08.127817 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:32.111008 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:54.053943 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:15.069825 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:37.833846 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:59.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:01:20.029903 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:01:41.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:02.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:23.117601 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:44.129786 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:05.129824 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:26.125859 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:35.305499 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:57600] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcCh9SswJuvopo3lOgCvgAAAIU"]
[Sun Mar 15 16:03:48.129765 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:00.259212 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.228.16:35274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcCoHjZBu2q05ozVU_wtwAAAU4"]
[Sun Mar 15 16:04:09.141779 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:30.133243 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:51.074015 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:05:16.129780 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:05:38.057910 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:00.129875 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:21.144318 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:42.122093 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:03.133848 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:25.129831 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:46.122993 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:08.096141 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:34.093570 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:32902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:37.408196 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.244.31:54770] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcDtdSswJuvopo3lOgDZAAAAJU"]
[Sun Mar 15 16:08:55.122138 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:07.475886 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:38196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcD03jZBu2q05ozVU_xTgAAAVE"]
[Sun Mar 15 16:09:16.137788 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:37.083103 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:59.122079 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:10:21.116912 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:10:43.173820 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:11:22.129899 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:11:44.121657 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:06.125787 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:27.122128 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:48.125798 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:10.121787 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:31.141871 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:55.121896 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:06.534021 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:44750] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcE_nbQATo66fKoS7znIQAAAMQ"]
[Sun Mar 15 16:14:17.133808 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:29.408567 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.228.16:56906] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcFFdSswJuvopo3lOgEBgAAAJA"]
[Sun Mar 15 16:14:38.133833 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:52.580001 2026] [:error] [pid 21946:tid 140411649607424] [client 87.121.84.71:35244] [client 87.121.84.71] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/plugins/jquery-file-upload/server/php/index.php"] [unique_id "abcFLHbQATo66fKoS7znQgAAAMs"]
[Sun Mar 15 16:14:59.134371 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:15:21.149800 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37074] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:15:44.130384 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:16:05.123864 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:16:29.129810 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:01.120302 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:29.121344 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:50.125780 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:12.147618 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:33.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:54.148327 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:19:07.552810 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:54034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcGK3jZBu2q05ozVU_zGAAAAVc"]
[Sun Mar 15 16:19:18.125808 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:19:40.126880 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:01.473565 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:23.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:44.119194 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:07.164716 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:29.137768 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:51.057850 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41540] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:22:23.046136 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:22:51.282559 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:13.129775 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:34.122476 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:55.132072 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:24:17.153779 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:24:41.129796 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:02.141855 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:24.130508 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:45.145932 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:06.121893 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:30.136279 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:51.129806 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:27:14.121262 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:27:45.053856 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:07.131885 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:35.126490 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:57.053867 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:18.121885 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:39.125825 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:42.849521 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.244.31:56520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcIppqj1wV0Si-OkeeDXQAAAAU"]
[Sun Mar 15 16:30:00.125792 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:30:11.923227 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:53838] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcIw3jZBu2q05ozVU_0kwAAAVU"]
[Sun Mar 15 16:30:24.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:30:47.165494 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:11.121811 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:33.111608 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:54.125819 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:32:15.137817 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:32:36.129816 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:06.126149 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:27.141793 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:57.122331 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:34:18.137814 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:34:40.129963 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:01.113936 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:05.589020 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.244.31:59758] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcJ6XbQATo66fKoS7zp2gAAANA"]
[Sun Mar 15 16:35:22.093897 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:37.711510 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.228.16:46342] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcKCXbQATo66fKoS7zp7QAAANM"]
[Sun Mar 15 16:35:45.129952 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:09.072908 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:30.129895 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:56.129911 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:17.132936 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:38.133771 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:59.144176 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:38:20.299918 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:38:43.123918 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:39:19.059909 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53500] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:39:40.118136 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:02.137864 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:23.137779 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:44.125827 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:08.137834 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:16.526483 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:58912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcLXNSswJuvopo3lOgHZAAAAIY"]
[Sun Mar 15 16:41:30.130194 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:45.453095 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:33704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcLedSswJuvopo3lOgHbgAAAJM"]
[Sun Mar 15 16:41:52.093823 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:42:19.157843 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:42:40.133817 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:01.121780 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:22.133786 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:44.115308 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:44:06.133803 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:44:42.069883 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:03.133789 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:24.125876 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:45.101304 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:06.123315 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:29.044072 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:35730] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcMlbABkC4fWIHEf8GNqwAAAFE"]
[Sun Mar 15 16:46:29.130462 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:51.133612 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58338] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:55.301242 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:53274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcMr7ABkC4fWIHEf8GNvwAAAEo"]
[Sun Mar 15 16:47:14.045908 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:47:41.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:03.125394 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:25.126570 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:46.793789 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:09.133772 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:30.033925 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:51.125815 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:50:25.125915 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:50:46.053846 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:07.125953 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:33.137810 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:43.852254 2026] [:error] [pid 21533:tid 140411666392832] [client 15.235.27.135:59634] [client 15.235.27.135] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcNznjZBu2q05ozVU_25wAAAUk"]
[Sun Mar 15 16:51:48.289279 2026] [:error] [pid 11972:tid 140411540502272] [client 51.161.37.83:59746] [client 51.161.37.83] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abcN1Jqj1wV0Si-OkeeGVwAAABg"]
[Sun Mar 15 16:51:54.121853 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:52:21.121886 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:52:25.655021 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.228.16:39562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcN-XbQATo66fKoS7zsJwAAAMM"]
[Sun Mar 15 16:52:43.057791 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:05.017828 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:26.125943 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:47.122693 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:08.133789 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:29.045840 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:50.121781 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:11.133778 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:32.057842 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:53.131295 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:14.141008 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:35.125834 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:56.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:57.290807 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:46816] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcPCdSswJuvopo3lOgJBAAAAJQ"]
[Sun Mar 15 16:57:17.125793 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:57:38.130905 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:00.097820 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37108] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:21.123982 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:34.806333 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:38122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcPatSswJuvopo3lOgJRgAAAI0"]
[Sun Mar 15 16:58:43.131350 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:04.129825 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:25.121240 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:47.137812 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:08.029140 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:29.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:50.142016 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:11.125895 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:32.121814 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:55.101864 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:15.946340 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:52786] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcQR5qj1wV0Si-OkeeIAQAAABE"]
[Sun Mar 15 17:02:16.125774 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:37.121852 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:59.125825 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:21.061238 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:42.129777 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:53.489698 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:54248] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcQqXbQATo66fKoS7ztiwAAAMQ"]
[Sun Mar 15 17:04:04.125827 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:04:26.121880 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:04:48.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:09.131390 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:30.025802 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:51.119673 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:12.125882 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:33.121812 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:54.124156 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:15.136437 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:22.813184 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:43618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcRenjZBu2q05ozVU_4wQAAAU0"]
[Sun Mar 15 17:07:36.057940 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:57.125953 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:08:18.121799 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:08:40.121796 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:01.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:19.795602 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.228.16:60852] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcR75qj1wV0Si-OkeeJFAAAAAs"]
[Sun Mar 15 17:09:23.114798 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:44.137850 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:06.403193 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:29.125680 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:56.053842 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:11:17.130277 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:11:39.045926 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:00.125512 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:21.129783 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:42.129793 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:51.437601 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.244.31:56646] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcSwwlT9VtDQc7bgUw21QAAARM"]
[Sun Mar 15 17:13:03.133816 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:13:26.136552 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:13:48.121785 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:09.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:21.788114 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:60632] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcTHbABkC4fWIHEf8GQ1QAAAEY"]
[Sun Mar 15 17:14:30.125886 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:51.118902 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:12.105835 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:33.129805 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:54.137802 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:15.073589 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:36.119226 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:57.021886 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:17:18.133789 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:17:39.100767 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:00.129560 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51082] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:00.533300 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:47560] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcT-LABkC4fWIHEf8GRMgAAAEE"]
[Sun Mar 15 17:18:21.021806 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:43.126781 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51502] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:05.129816 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:26.081948 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:43.058853 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:42502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcUX9SswJuvopo3lOgLmAAAAI4"]
[Sun Mar 15 17:19:47.105053 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:09.134014 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:30.137798 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52384] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:52.091845 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:13.142163 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:34.129777 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:55.125777 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:16.061818 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:37.033815 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:58.317779 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:23:20.122387 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:23:24.117769 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:38654] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcVPHbQATo66fKoS7zvPgAAAMk"]
[Sun Mar 15 17:23:43.069975 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:13.445883 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:35.123623 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54732] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:56.137072 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:25:18.138286 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:25:40.045853 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:02.045910 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:23.985822 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:45.049840 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:06.025845 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:27.123355 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:48.125788 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:09.121244 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:30.105588 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:51.049844 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:12.122174 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:35.128075 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:56.129795 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:30:18.126812 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:30:40.037848 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:02.125882 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:24.133800 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:45.133870 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:08.129888 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:30.133802 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:51.094853 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:12.125789 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:34.110671 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:51.078542 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.244.31:59882] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcXr3bQATo66fKoS7zwKgAAAMg"]
[Sun Mar 15 17:33:55.117916 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:34:12.725268 2026] [core:alert] [pid 21805:tid 140411607643904] [client 66.249.74.169:38228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 17:34:16.126793 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:34:38.033808 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:00.135692 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:08.024584 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:34928] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcX_AlT9VtDQc7bgUw57QAAARg"]
[Sun Mar 15 17:35:22.099987 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:43.121893 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:06.133831 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:27.125875 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:48.129804 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:10.137781 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32828] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:32.137329 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:54.121794 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:21.045899 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:47.120957 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:55.645349 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:44118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcY37ABkC4fWIHEf8GTLgAAAEY"]
[Sun Mar 15 17:39:08.125851 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:39:31.764924 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:39:53.141824 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:40:14.134770 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:40:25.478126 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:36106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcZObABkC4fWIHEf8GTcQAAAEM"]
[Sun Mar 15 17:40:40.121778 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:01.105839 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:23.125801 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:44.137181 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:05.135870 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:27.121200 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:48.133622 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:09.123624 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:31.137789 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:52.126096 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:12.130099 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.244.31:41304] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcaHHjZBu2q05ozVU_8sAAAAVY"]
[Sun Mar 15 17:44:13.033811 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:34.121824 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:56.045884 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:45:17.137781 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:45:28.768706 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.228.16:43280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcaaAlT9VtDQc7bgUw70gAAAQo"]
[Sun Mar 15 17:45:38.121908 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:02.114314 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:23.053923 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:44.133786 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:06.128770 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:28.117792 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:49.558878 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:12.129799 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:33.126510 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:55.133360 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:49:16.082193 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:49:17.289004 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.244.31:55652] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcbTZqj1wV0Si-OkeeNbQAAAAM"]
[Sun Mar 15 17:49:37.138258 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:00.154312 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:21.130172 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:42.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:55.974196 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:35734] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcbr9SswJuvopo3lOgPKAAAAJM"]
[Sun Mar 15 17:51:03.121784 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:51:24.129844 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:51:45.129087 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:06.161790 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:28.123394 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:50.125832 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:11.130229 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:35.139385 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:57.121215 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:54:18.135121 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:54:39.581815 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:55:01.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:56:06.242111 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:42544] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcc5pqj1wV0Si-OkeeOfgAAAAU"]
[Sun Mar 15 17:59:46.908534 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.244.31:36264] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcdwnbQATo66fKoS7zz_gAAAMY"]
[Sun Mar 15 18:00:02.251135 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 45.227.253.15:53010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:00:24.121874 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:00:46.125243 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:07.125843 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:28.122206 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:33.185796 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.228.16:47332] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abceLXjZBu2q05ozVU__AQAAAUk"]
[Sun Mar 15 18:01:49.129800 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:10.138095 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:32.080055 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52850] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:53.129812 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:14.134361 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:35.133812 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:56.138346 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:17.123023 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:38.122003 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54584] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:59.125850 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:05:10.971828 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:46484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcfBtSswJuvopo3lOgRQwAAAJc"]
[Sun Mar 15 18:05:22.681163 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:05:46.129832 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55490] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:09.126004 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:30.045817 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:42.760866 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:39036] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcfYglT9VtDQc7bgUw_YAAAAQY"]
[Sun Mar 15 18:06:52.125866 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:14.148804 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:35.033819 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:56.061812 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:08:17.137691 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:08:39.133845 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:00.149784 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:21.036820 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:42.145901 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:03.125822 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:21.994641 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.244.31:51430] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcgPdSswJuvopo3lOgSOAAAAJE"]
[Sun Mar 15 18:10:30.129785 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:52.149807 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:13.131470 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:34.045825 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:55.118214 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:12:08.086430 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.228.16:51746] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcgqAlT9VtDQc7bgUxAVAAAARQ"]
[Sun Mar 15 18:12:17.126621 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:12:38.066528 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:00.129791 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33850] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:21.125803 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:43.204902 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:04.130139 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:25.145996 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:47.125085 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:08.149913 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:30.205814 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:47.231235 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.244.31:47630] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abchg5qj1wV0Si-OkeeRogAAABY"]
[Sun Mar 15 18:15:52.045824 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:13.132137 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:34.133778 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:58.097892 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:17:14.848353 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:37034] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abch2tSswJuvopo3lOgS-wAAAI8"]
[Sun Mar 15 18:17:20.118407 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:17:46.097872 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:07.125816 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:25.561680 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:37702] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abciIbABkC4fWIHEf8GYugAAAEs"]
[Sun Mar 15 18:18:28.119264 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:49.129800 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:10.126557 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:31.117838 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:52.132260 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:13.141800 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40232] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:35.123781 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:55.895173 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.244.31:34524] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcit3jZBu2q05ozVU8BpwAAAUI"]
[Sun Mar 15 18:20:56.125786 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:14.667121 2026] [mime_magic:error] [pid 21946:tid 140411624429312] (70014)End of file found: [client 66.249.74.169:60428] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 18:21:17.057960 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:38.121811 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:59.137799 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:22:20.589801 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:22:38.275490 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:57414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcjHrABkC4fWIHEf8GZJgAAAEM"]
[Sun Mar 15 18:22:42.129794 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:09.124034 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:31.128058 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:52.131377 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:14.129846 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:35.125817 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:56.129797 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:25:16.558042 2026] [mime_magic:error] [pid 21806:tid 140411658000128] (70014)End of file found: [client 162.144.233.59:58332] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 18:25:18.077795 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:25:19.301916 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] [client 162.144.233.59:58434] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 18:25:40.117592 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:01.133769 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:19.048656 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.244.31:52776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcj-5qj1wV0Si-OkeeSsgAAAAg"]
[Sun Mar 15 18:26:26.125815 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:47.141793 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:08.132211 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:29.121699 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:51.153887 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:12.105811 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:33.053818 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:54.121277 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:29:21.057829 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:29:42.057857 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:03.125816 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:25.117821 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:47.076929 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:08.054185 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:31.125776 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:52.125813 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:59.011837 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 102.219.155.27:23922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Sun Mar 15 18:32:13.123793 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:32:34.070630 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:32:55.037823 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:17.133775 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:38.125967 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:59.073906 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:34:20.124067 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:34:44.121785 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:05.113633 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:27.045861 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:49.045830 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:10.129779 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:31.128490 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:43.019833 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:53994] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcma9SswJuvopo3lOgUtwAAAJY"]
[Sun Mar 15 18:36:53.121805 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:14.106054 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:36.069870 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:57.122102 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:38:15.570927 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:54152] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcmxwlT9VtDQc7bgUxDNwAAAQQ"]
[Sun Mar 15 18:38:19.037880 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:38:40.125821 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:01.137926 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:23.130296 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:45.123941 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:07.057917 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:28.120236 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:50.126922 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:11.123745 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:32.136519 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:46.991179 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:39468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcnmtSswJuvopo3lOgVEAAAAIE"]
[Sun Mar 15 18:41:54.135984 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:16.685816 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:38.121765 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:59.021787 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:43:20.137765 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:43:40.489445 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.228.16:35276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcoDHbQATo66fKoS7z5JwAAANY"]
[Sun Mar 15 18:43:41.121843 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:03.130743 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:24.809392 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:46.701834 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:08.041886 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:29.129779 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:51.125287 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:12.137788 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:33.124528 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:54.081792 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:47:13.109414 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:54474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abco4dSswJuvopo3lOgVqQAAAIM"]
[Sun Mar 15 18:47:16.129792 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:47:38.033873 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:00.129785 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:21.041823 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:43.070578 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:53.004936 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:41304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcpRZqj1wV0Si-OkeeU9gAAAA4"]
[Sun Mar 15 18:49:05.141461 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:49:27.133873 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:49:49.121842 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:11.097870 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:32.033891 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:54.085861 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:15.041800 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:36.121783 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:58.125792 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:52:13.493238 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:46128] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcqDZqj1wV0Si-OkeeVRQAAABE"]
[Sun Mar 15 18:52:19.131142 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:52:40.509891 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:03.133807 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:24.127248 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:45.125875 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:06.065905 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:32776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:13.003160 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.228.16:39988] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcqhZqj1wV0Si-OkeeVZwAAAAQ"]
[Sun Mar 15 18:54:27.133815 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:49.065871 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:11.131912 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:33.125823 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:55.081807 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:56:17.137814 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34082] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:56:39.037809 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:00.141986 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:21.129865 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:49.137424 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:10.037832 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:31.125804 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:53.129798 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:14.130106 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:19.529123 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.228.16:47010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcrt3bQATo66fKoS7z6ZAAAANg"]
[Sun Mar 15 18:59:35.133817 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:56.122262 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:00:17.050059 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:00:27.068468 2026] [mime_magic:error] [pid 32654:tid 140411658000128] (70014)End of file found: [client 66.249.74.169:54254] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 19:00:38.133788 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:00.130521 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:21.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:43.102447 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:05.120972 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:27.129826 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:48.120324 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:10.121450 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:32.045878 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:54.069827 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:56.951043 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:39040] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcszHjZBu2q05ozVU8FJwAAAVc"]
[Sun Mar 15 19:04:16.125936 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:04:37.125802 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:04:46.600846 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:38992] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcs_njZBu2q05ozVU8FOgAAAU0"]
[Sun Mar 15 19:04:58.141407 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:05:19.130793 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:05:41.129783 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:03.122010 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:25.113811 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:46.129887 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:07.131303 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40376] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:29.129861 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:50.138858 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:12.482784 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:34.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:55.133998 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:58.346197 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:57256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abct-nbQATo66fKoS7z7LgAAAMM"]
[Sun Mar 15 19:09:17.045803 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:09:38.057820 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:09:49.950367 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:50946] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcuLXjZBu2q05ozVU8FnwAAAU0"]
[Sun Mar 15 19:09:59.113845 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:10:20.129892 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:10:41.057811 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:03.057836 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:26.113985 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:48.126542 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:10.130108 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:31.125793 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:53.126791 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:15.133850 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:36.121764 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:57.129790 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:14:18.122766 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:14:21.815085 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:47408] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcvPXjZBu2q05ozVU8GKQAAAU0"]
[Sun Mar 15 19:14:40.125826 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:01.122654 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:11.341156 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.228.16:32820] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcvbwlT9VtDQc7bgUxG6QAAARQ"]
[Sun Mar 15 19:15:22.121773 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:43.110457 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:04.127146 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:25.581798 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:47.125795 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:11.109327 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:32.129366 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:55.277779 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:18:17.033951 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:18:39.093864 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:00.129816 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:21.045939 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:28.267018 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:34968] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcwcAlT9VtDQc7bgUxHjgAAAQs"]
[Sun Mar 15 19:19:42.140558 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:03.133804 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:16.651041 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.228.16:58566] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcwoAlT9VtDQc7bgUxHqAAAAQE"]
[Sun Mar 15 19:20:24.137801 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:47.109129 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:08.117929 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:29.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:51.126659 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:14.317863 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:37.141863 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:59.098619 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:23:21.119557 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:23:42.145861 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:03.045849 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:25.119967 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:46.129824 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:56.887577 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:41886] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcxuHbQATo66fKoS7z9GwAAAMs"]
[Sun Mar 15 19:25:08.777891 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:25:30.045886 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:25:44.127483 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.228.16:36590] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcx6LABkC4fWIHEf8GeiAAAAE0"]
[Sun Mar 15 19:25:51.125801 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:12.130485 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:33.131476 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:55.118984 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:16.125850 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:37.141795 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:59.122261 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:28:21.125835 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:28:44.117840 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:07.145765 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:28.121998 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:49.137872 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:00.823101 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:37406] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcy6Jqj1wV0Si-OkeeZPQAAABc"]
[Sun Mar 15 19:30:10.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:31.121903 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:53.121822 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:14.078162 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:35.129824 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:57.126060 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:32:19.777765 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:32:41.123187 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:02.129995 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:24.119822 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58570] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:45.129907 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:07.077445 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:29.449849 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:51.133794 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:12.130099 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:34.129782 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:55.037810 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:36:16.133884 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:36:37.128633 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:00.124093 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:22.117808 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:43.134131 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33156] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:09.129781 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:30.053845 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:51.125838 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:12.129777 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:33.069837 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:35.511499 2026] [core:alert] [pid 32654:tid 140411548894976] [client 66.249.74.169:52532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 19:39:54.119598 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:40:20.069875 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:40:40.560685 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:55806] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc1aHjZBu2q05ozVU8I7QAAAUk"]
[Sun Mar 15 19:40:42.130295 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:03.126452 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:19.623326 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.228.16:51238] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc1j5qj1wV0Si-OkeeaVwAAABE"]
[Sun Mar 15 19:41:24.037818 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:45.129831 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:07.069921 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:29.129812 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:50.126158 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:11.133813 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36502] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:32.133831 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:55.068052 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:16.117785 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:37.021807 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:59.129844 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:45:20.053852 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:45:42.057836 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:02.083489 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:53200] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc2qrABkC4fWIHEf8GgRAAAAFA"]
[Sun Mar 15 19:46:04.070887 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:25.133859 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:36.526633 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:41276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc2zHbQATo66fKoS7z_AAAAANc"]
[Sun Mar 15 19:46:46.033816 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:07.126320 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:30.069905 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:51.145742 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:12.140122 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:33.061931 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:55.125837 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:16.129876 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:38.126588 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:59.121800 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:50:21.125781 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:50:43.090992 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:07.133818 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:14.344469 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.244.31:35428] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc34nbQATo66fKoS7z_ZgAAAM4"]
[Sun Mar 15 19:51:28.125914 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:46.184162 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:52666] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc4Apqj1wV0Si-OkeebSQAAAAo"]
[Sun Mar 15 19:51:49.129808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:10.098460 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:32.130106 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:53.121203 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:14.128394 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:36.135695 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:57.120988 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42568] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:54:18.124360 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:54:39.125789 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:00.141837 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:22.761447 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:44.122218 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:05.119985 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:29.133843 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:40.739246 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.244.31:48880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc5KAlT9VtDQc7bgUxLngAAAQ8"]
[Sun Mar 15 19:56:51.130811 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:12.125800 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:13.707161 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:35602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc5SXjZBu2q05ozVU8KlgAAAUE"]
[Sun Mar 15 19:57:34.139755 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:56.125812 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:58:18.110891 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:58:39.117827 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:02.617811 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:24.220997 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:45.133796 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:06.135966 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:28.127435 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:49.125813 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:10.131373 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:31.125798 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:52.126805 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:14.121802 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:22.724784 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.228.16:36862] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc6fnbQATo66fKoS7wApgAAAMk"]
[Sun Mar 15 20:02:37.125829 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:58.064537 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:03:19.073051 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:03:40.069836 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49732] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:02.154725 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:24.104654 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:46.029820 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:07.133787 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:28.088742 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:50.126228 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:08.544210 2026] [access_compat:error] [pid 21946:tid 140411582465792] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 20:06:10.952728 2026] [access_compat:error] [pid 21806:tid 140411725141760] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.170730 2026] [access_compat:error] [pid 21946:tid 140411632822016] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.387920 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.606292 2026] [access_compat:error] [pid 21946:tid 140411741927168] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 20:06:11.821337 2026] [access_compat:error] [pid 21806:tid 140411708356352] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:12.038892 2026] [access_compat:error] [pid 21946:tid 140411624429312] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 20:06:12.122262 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:33.736962 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:55.033855 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:16.082372 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:17.122900 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:54312] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc7pbABkC4fWIHEf8GiqwAAAEE"]
[Sun Mar 15 20:07:37.123983 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:39.477914 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:43994] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc7u3bQATo66fKoS7wBRAAAAM4"]
[Sun Mar 15 20:08:00.086615 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:08:21.133842 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:08:43.125504 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:05.134360 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:26.114967 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:48.129818 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:09.131066 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:31.109975 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:53.130820 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:14.069835 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:35.985861 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:57.125084 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:19.117855 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:20.920119 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:47162] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc81NSswJuvopo3lOgdywAAAIo"]
[Sun Mar 15 20:12:40.141297 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:56.619715 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:57090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc8-HbQATo66fKoS7wBpAAAAMI"]
[Sun Mar 15 20:13:02.125838 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:23.129809 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:25.194162 2026] [access_compat:error] [pid 21806:tid 140411624429312] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gptsh.php
[Sun Mar 15 20:13:25.323583 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wolv.php
[Sun Mar 15 20:13:25.452642 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lock.php
[Sun Mar 15 20:13:25.582074 2026] [access_compat:error] [pid 21806:tid 140411599251200] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/edorxrr.php
[Sun Mar 15 20:13:25.710272 2026] [access_compat:error] [pid 21806:tid 140411691570944] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ox.php
[Sun Mar 15 20:13:25.838821 2026] [access_compat:error] [pid 21806:tid 140411607643904] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1754569357_be.php
[Sun Mar 15 20:13:25.968019 2026] [access_compat:error] [pid 21806:tid 140411582465792] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-kd4xalrg7m.php
[Sun Mar 15 20:13:26.097583 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hplfuns.php
[Sun Mar 15 20:13:26.226663 2026] [access_compat:error] [pid 21806:tid 140411666392832] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test2.php
[Sun Mar 15 20:13:26.355293 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cah.php
[Sun Mar 15 20:13:26.487412 2026] [access_compat:error] [pid 21806:tid 140411632822016] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/boltt.php
[Sun Mar 15 20:13:26.619580 2026] [access_compat:error] [pid 21806:tid 140411708356352] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/prv8shell.php
[Sun Mar 15 20:13:26.757549 2026] [access_compat:error] [pid 21806:tid 140411540502272] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1100.php
[Sun Mar 15 20:13:26.887543 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sc_1.php
[Sun Mar 15 20:13:27.015710 2026] [access_compat:error] [pid 21806:tid 140411590858496] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1998.php
[Sun Mar 15 20:13:27.143696 2026] [access_compat:error] [pid 21806:tid 140411658000128] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wtiiy.php
[Sun Mar 15 20:13:27.271703 2026] [access_compat:error] [pid 21806:tid 140411574073088] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sxb.php
[Sun Mar 15 20:13:27.400890 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-mter.php
[Sun Mar 15 20:13:27.528857 2026] [access_compat:error] [pid 21806:tid 140411565680384] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Sun Mar 15 20:13:27.656773 2026] [access_compat:error] [pid 21806:tid 140411641214720] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hc.php
[Sun Mar 15 20:13:27.784372 2026] [access_compat:error] [pid 21806:tid 140411548894976] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Sun Mar 15 20:13:43.199264 2026] [access_compat:error] [pid 11972:tid 140411725141760] [client 20.151.11.236:55034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yussef.php
[Sun Mar 15 20:13:43.328668 2026] [access_compat:error] [pid 21533:tid 140411691570944] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0771dccd2958b85d48125d146d77e038akc.php
[Sun Mar 15 20:13:43.458717 2026] [access_compat:error] [pid 21533:tid 140411574073088] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/19.php
[Sun Mar 15 20:13:43.590266 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/we-es-o.php
[Sun Mar 15 20:13:43.736056 2026] [access_compat:error] [pid 21533:tid 140411590858496] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb5.php
[Sun Mar 15 20:13:43.865636 2026] [access_compat:error] [pid 21533:tid 140411649607424] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fe5.php
[Sun Mar 15 20:13:43.994818 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp11.php
[Sun Mar 15 20:13:46.126421 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:47.187216 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] [client 20.151.11.236:54922] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 20:13:47.187877 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] [client 20.151.11.236:55040] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 20:13:47.317629 2026] [access_compat:error] [pid 21806:tid 140411565680384] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/16.php
[Sun Mar 15 20:13:47.450289 2026] [access_compat:error] [pid 21806:tid 140411641214720] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb.php
[Sun Mar 15 20:13:47.583483 2026] [access_compat:error] [pid 21806:tid 140411557287680] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ss.php
[Sun Mar 15 20:13:47.712348 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/h2.php
[Sun Mar 15 20:13:47.841646 2026] [access_compat:error] [pid 21946:tid 140411658000128] [client 20.151.11.236:55106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-p2r3q9c8k4.php
[Sun Mar 15 20:13:47.973754 2026] [access_compat:error] [pid 21806:tid 140411607643904] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ty.php
[Sun Mar 15 20:13:48.104165 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/albin.php
[Sun Mar 15 20:13:48.239254 2026] [access_compat:error] [pid 21806:tid 140411691570944] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Sun Mar 15 20:13:48.368365 2026] [access_compat:error] [pid 21806:tid 140411725141760] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Sun Mar 15 20:13:48.498228 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fsgdjkl.php
[Sun Mar 15 20:13:48.627621 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.151.11.236:55126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/uuu.php
[Sun Mar 15 20:13:48.759585 2026] [access_compat:error] [pid 21805:tid 140411741927168] [client 20.151.11.236:55132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/by.php
[Sun Mar 15 20:13:48.895065 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 20.151.11.236:55132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Sun Mar 15 20:13:49.038794 2026] [access_compat:error] [pid 32654:tid 140411548894976] [client 20.151.11.236:55140] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/asw.php
[Sun Mar 15 20:13:49.179568 2026] [access_compat:error] [pid 11972:tid 140411574073088] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/eee.php
[Sun Mar 15 20:13:49.309550 2026] [access_compat:error] [pid 11972:tid 140411733534464] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lp6.php
[Sun Mar 15 20:13:49.439350 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akses.php
[Sun Mar 15 20:13:49.568406 2026] [access_compat:error] [pid 11972:tid 140411624429312] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/no1.php
[Sun Mar 15 20:13:49.696942 2026] [access_compat:error] [pid 11972:tid 140411582465792] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/teee.php
[Sun Mar 15 20:13:49.826145 2026] [access_compat:error] [pid 11972:tid 140411716749056] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Sun Mar 15 20:13:49.961175 2026] [access_compat:error] [pid 11972:tid 140411557287680] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Sun Mar 15 20:13:50.101076 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/kk.php
[Sun Mar 15 20:13:50.230377 2026] [access_compat:error] [pid 11972:tid 140411683178240] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Sun Mar 15 20:13:50.360286 2026] [access_compat:error] [pid 11972:tid 140411590858496] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cs.php
[Sun Mar 15 20:13:50.489458 2026] [access_compat:error] [pid 21533:tid 140411733534464] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/w2025.php
[Sun Mar 15 20:13:50.618450 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/swallowable.php
[Sun Mar 15 20:13:50.770670 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fvvff.php
[Sun Mar 15 20:13:50.900309 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a2.php
[Sun Mar 15 20:13:51.029555 2026] [access_compat:error] [pid 21533:tid 140411548894976] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sty.php
[Sun Mar 15 20:13:51.158484 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/g.php
[Sun Mar 15 20:13:51.287296 2026] [access_compat:error] [pid 21533:tid 140411674785536] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pp.php
[Sun Mar 15 20:13:51.416071 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sys.php
[Sun Mar 15 20:14:07.065928 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:14:29.126006 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:14:50.129812 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:11.144304 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:33.060016 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:55.129929 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:17.033853 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:38.122630 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:59.078572 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:20.079899 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:41.125810 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:43.450645 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:54080] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc-F7ABkC4fWIHEf8GjgQAAAFg"]
[Sun Mar 15 20:18:02.117074 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:18:18.967800 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.228.16:44002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc-OtSswJuvopo3lOgebgAAAIk"]
[Sun Mar 15 20:18:24.045874 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:18:46.133851 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:09.088945 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:30.125829 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:51.121790 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:20:12.133794 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:20:33.125980 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:10.136925 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:31.128380 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:55.046053 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:16.125965 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:43.125821 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:55.280884 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:49332] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc_T7ABkC4fWIHEf8Gj6gAAAEw"]
[Sun Mar 15 20:23:13.129809 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:23:27.251523 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:35394] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc_b3jZBu2q05ozVU8NAwAAAUQ"]
[Sun Mar 15 20:23:41.069843 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:24:13.065895 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:24:41.037802 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:03.121884 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:24.129801 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:45.121412 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:06.125797 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:27.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:48.116593 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:09.121639 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:30.105786 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:51.125810 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:12.069815 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:12.723925 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.244.31:53214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdAjLABkC4fWIHEf8GkXgAAAE0"]
[Sun Mar 15 20:28:33.109837 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:55.125787 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:55.294407 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:48868] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdAt3jZBu2q05ozVU8NcwAAAVU"]
[Sun Mar 15 20:29:16.137810 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:29:39.153802 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:01.176499 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:26.133765 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:47.129954 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:08.129790 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:29.128874 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:50.125954 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:12.132454 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:34.129808 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:55.133809 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:33:17.129891 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:33:20.216563 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.244.31:36776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdBwAlT9VtDQc7bgUxPjQAAAQo"]
[Sun Mar 15 20:33:38.134199 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:00.124958 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:21.057384 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:42.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:03.089828 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:24.113813 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:48.127331 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:10.126377 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:32.120892 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:54.101046 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:16.041800 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:37.964898 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:59.130054 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:38:20.124244 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:38:41.133791 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:03.121789 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:25.133858 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:46.125786 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:07.057844 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:29.120965 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:51.119133 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:12.129843 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:33.125785 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:55.128121 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:42:16.121780 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:42:38.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:00.128505 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:21.128071 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:42.134161 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:43.715124 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:44090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdEL3jZBu2q05ozVU8OqwAAAVg"]
[Sun Mar 15 20:44:04.037838 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:44:26.118911 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:44:48.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:09.127488 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:31.126956 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:35.034438 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.228.16:45568] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdEn7ABkC4fWIHEf8Gl3AAAAFM"]
[Sun Mar 15 20:45:52.122380 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:13.132147 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:34.129778 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:56.033863 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:47:17.124522 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:47:39.057865 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:00.125826 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49852] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:21.127233 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:43.033949 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:04.131279 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:08.642629 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.244.31:39818] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdFdHjZBu2q05ozVU8PKgAAAVU"]
[Sun Mar 15 20:49:27.126329 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:48.125308 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:10.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:31.125769 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:49.492725 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.228.16:56664] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdF2Zqj1wV0Si-OkeehRAAAAAI"]
[Sun Mar 15 20:50:53.133810 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:15.075288 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:36.123158 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:58.125835 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:52:20.117854 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:52:41.129784 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:02.129810 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:23.129806 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:45.125819 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:06.129249 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:19.226753 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.244.31:34098] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdGq3bQATo66fKoS7wFQQAAANE"]
[Sun Mar 15 20:54:27.125802 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:49.125848 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:10.129808 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:32.133784 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:54.121819 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:13.662588 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.228.16:33884] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdHHXjZBu2q05ozVU8P0gAAAUY"]
[Sun Mar 15 20:56:16.125785 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:37.069796 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:58.069530 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:57:20.129208 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:57:42.122140 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56258] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:03.134388 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:24.119490 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:45.033802 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:07.121798 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:29.129836 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:50.561935 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:39802] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdH9tSswJuvopo3lOghzAAAAIs"]
[Sun Mar 15 20:59:51.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:15.122339 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:36.137787 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:57.133784 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:01:18.058005 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:01:20.229506 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:48040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdIUNSswJuvopo3lOgiBgAAAIE"]
[Sun Mar 15 21:01:39.133733 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:01.121759 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:23.037867 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:44.129794 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:06.089805 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:27.730820 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:49.163596 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:11.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:32.129831 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:54.125854 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:16.069830 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:37.129819 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:58.129791 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:19.153847 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:40.125849 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:44.375840 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:36384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdJlNSswJuvopo3lOgiaAAAAIU"]
[Sun Mar 15 21:07:01.127622 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:07:22.036358 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:07:44.106534 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:05.152142 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:26.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:48.129446 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:10.129821 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:32.138183 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36518] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:53.158162 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:17.125915 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37030] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:33.617577 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.244.31:58852] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdKeXbQATo66fKoS7wG2wAAANE"]
[Sun Mar 15 21:10:38.121685 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:59.130232 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:20.069914 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:41.045808 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:52.540682 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:34830] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdKyLABkC4fWIHEf8GoIwAAAE8"]
[Sun Mar 15 21:12:02.136942 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:12:23.124976 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:12:44.137815 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:05.124908 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:26.117852 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:48.125833 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:09.054903 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:32.079367 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:53.111018 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:14.105900 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:36.125905 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:44.140611 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:42694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdLsLABkC4fWIHEf8GoawAAAFE"]
[Sun Mar 15 21:15:59.122257 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:16:21.125794 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:16:42.133773 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:03.121858 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:17.117846 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.228.16:47344] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdMDQlT9VtDQc7bgUxTowAAAQo"]
[Sun Mar 15 21:17:24.133028 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:45.137811 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:06.126878 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:27.134324 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:49.081793 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:10.122321 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:31.129788 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:52.034005 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:14.125772 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:36.129807 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:59.137820 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:21:06.169021 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:60236] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdM8rABkC4fWIHEf8GotwAAAFE"]
[Sun Mar 15 21:21:21.125780 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:21:42.079374 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:03.121952 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:25.125787 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:31.210695 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:48690] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdNR3bQATo66fKoS7wHpAAAAMA"]
[Sun Mar 15 21:22:46.131855 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:08.125785 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:29.120088 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:50.126565 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:11.119910 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:32.901577 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:54.125788 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:15.135071 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:36.130551 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:57.049818 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:26:21.116159 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:26:42.140243 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:03.133816 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:25.121828 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:27.063878 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdOb9SswJuvopo3lOgjyQAAAIU"]
[Sun Mar 15 21:27:46.130828 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:00.782872 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.228.16:44884] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdOkHbQATo66fKoS7wICgAAANQ"]
[Sun Mar 15 21:28:07.105990 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:28.090101 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:50.118368 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:11.117855 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:32.103472 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:58.140544 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:30:19.154139 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:30:41.133818 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:02.121840 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:24.145783 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:45.121843 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:06.125002 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:27.133867 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:39.875003 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:40484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdPp7ABkC4fWIHEf8GplAAAAFU"]
[Sun Mar 15 21:32:48.127486 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:09.395013 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.228.16:35278] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdPxbABkC4fWIHEf8GpoAAAAFU"]
[Sun Mar 15 21:33:10.030566 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:31.126506 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:53.122984 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:14.141827 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:36.120879 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:57.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:35:20.117786 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:35:41.126956 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:03.090514 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:26.126916 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:27.918867 2026] [access_compat:error] [pid 21806:tid 140411666392832] [client 103.177.124.25:52886] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Sun Mar 15 21:36:47.129938 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:09.037822 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:30.128878 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:51.119610 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:53.034564 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.244.31:37266] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdQ4XjZBu2q05ozVU8S0AAAAVM"]
[Sun Mar 15 21:38:12.125909 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:38:34.133828 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:38:56.119694 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:39:17.125774 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:39:39.057860 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:00.121983 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:21.459580 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:43.126364 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:04.129870 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:26.138437 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:48.145808 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:09.129853 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:30.029793 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:51.041819 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:12.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:33.128611 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:55.133881 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:44:17.045846 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:44:39.025829 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:00.129785 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:21.123800 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:42.125797 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:04.133811 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:25.125861 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:46.061796 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:10.061823 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:32.033861 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:53.061842 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:14.128018 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:28.823412 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:42212] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdTXNSswJuvopo3lOglFwAAAIE"]
[Sun Mar 15 21:48:35.129843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:56.121826 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:58.097132 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.228.16:48292] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdTeglT9VtDQc7bgUxV5QAAAQM"]
[Sun Mar 15 21:49:17.033818 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:49:38.134731 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:49:59.069788 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:50:21.124177 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:50:43.097936 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:04.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57006] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:25.069862 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:46.037820 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:07.125802 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:33.057888 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:54.126481 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:15.130288 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:36.125809 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:41.051866 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:52814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdUlXbQATo66fKoS7wJvAAAANc"]
[Sun Mar 15 21:53:57.129808 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:54:06.874859 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:33696] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdUrnjZBu2q05ozVU8UJAAAAVA"]
[Sun Mar 15 21:54:18.121979 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:54:39.094924 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:00.083352 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:22.069814 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:43.084669 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:07.117777 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:28.122026 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:49.122328 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:11.501952 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:33.120765 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:55.069910 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:16.119760 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:38.061865 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:59.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:59:04.098285 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.244.31:47754] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdV2Jqj1wV0Si-OkeemNQAAAAo"]
[Sun Mar 15 21:59:20.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:59:31.058625 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.228.16:59608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdV89SswJuvopo3lOglvQAAAJg"]
[Sun Mar 15 21:59:41.121990 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:02.230456 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:23.153814 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:45.129832 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:06.125776 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:29.065899 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:50.137810 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:11.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:33.117837 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:55.125770 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:17.121937 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:38.124058 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:59.133804 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:04:04.515158 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.244.31:35206] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdXBHjZBu2q05ozVU8UzwAAAVQ"]
[Sun Mar 15 22:04:21.045877 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:04:42.043748 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:56674] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdXKXbQATo66fKoS7wKvgAAANU"]
[Sun Mar 15 22:04:44.141832 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:05.079855 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:26.102687 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:47.085802 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34726] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:09.085826 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:30.041869 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:51.129810 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:12.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:33.089963 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:55.139102 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:08:16.134518 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:08:39.129794 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:00.141851 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:21.057952 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:42.126350 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:04.069855 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:04.338890 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.228.16:49136] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdYbHjZBu2q05ozVU8VZQAAAUs"]
[Sun Mar 15 22:10:28.112796 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:49.137864 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:10.114057 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:32.135090 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37820] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:53.065797 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:14.130935 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:35.042344 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:56.149806 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:13:17.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:13:39.126893 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:02.114874 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:23.133782 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:34.435276 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:37162] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdZerABkC4fWIHEf8GsfQAAAEI"]
[Sun Mar 15 22:14:44.129817 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:05.125803 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:15.488240 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:53904] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdZo9SswJuvopo3lOgm4AAAAII"]
[Sun Mar 15 22:15:27.129849 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:51.142267 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:12.122956 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:33.069924 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:55.828524 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:17.122058 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40864] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:38.129928 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:59.121881 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:18:20.553801 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:18:42.121770 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:04.121814 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:26.125797 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:47.957874 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:58.604804 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:34364] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdavtSswJuvopo3lOgnSQAAAJQ"]
[Sun Mar 15 22:20:09.069865 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:20:30.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:20:36.072850 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:52610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abda5LABkC4fWIHEf8GtDgAAAEo"]
[Sun Mar 15 22:20:51.145827 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:13.127293 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:34.129820 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:55.113913 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:17.041939 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:38.137831 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:59.133833 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:23:20.133760 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:23:41.133810 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:03.133777 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:26.123536 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:47.025844 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:08.126470 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:19.007229 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:33686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdb_9SswJuvopo3lOgnpwAAAIM"]
[Sun Mar 15 22:25:31.517805 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:49.799376 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:55056] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdcHQlT9VtDQc7bgUxZEAAAAQY"]
[Sun Mar 15 22:25:53.137806 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:14.125806 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:36.137939 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:57.129856 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:27:18.130463 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:27:47.725796 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:11.121810 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:33.123090 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:55.053546 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:29:17.131445 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:29:39.069855 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:00.127813 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:22.133806 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:25.773059 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abddMQlT9VtDQc7bgUxZ1gAAARI"]
[Sun Mar 15 22:30:43.125780 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:04.121805 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:10.296088 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.228.16:46280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abddXglT9VtDQc7bgUxZ7AAAAQA"]
[Sun Mar 15 22:31:25.037836 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:46.125788 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:07.121263 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:28.133807 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:49.137905 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:10.065821 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:32.097421 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:54.049834 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:34:18.069815 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:34:39.129085 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:03.194349 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:25.082897 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:30.977424 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.244.31:40718] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdeYnjZBu2q05ozVU8XkgAAAUw"]
[Sun Mar 15 22:35:46.122468 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:07.137790 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:14.703043 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.228.16:37184] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdejpqj1wV0Si-Okeep-AAAAAM"]
[Sun Mar 15 22:36:28.133812 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:49.041849 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:10.126589 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51914] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:31.121986 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:52.124662 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:13.125796 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:34.129851 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:55.130561 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:39:16.125840 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:39:39.126115 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:01.045801 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:23.125854 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:52.148684 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:52.546296 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.244.31:47814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdfpAlT9VtDQc7bgUxbBQAAARA"]
[Sun Mar 15 22:41:13.079950 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:41:34.045864 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:41:55.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:16.092970 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:37.118215 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:58.133784 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:43:19.125896 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:43:40.127348 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:01.141876 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:22.133821 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:43.129862 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:04.137818 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:26.121222 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:47.121829 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:13.106914 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:34.137785 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:55.121816 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:16.120042 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:37.130789 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:58.129950 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:48:24.131276 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:48:45.126627 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:06.125790 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:28.125813 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:49.121225 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:10.131425 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:32.121794 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:53.057850 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:14.129840 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:21.904451 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.244.31:39924] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdiGXjZBu2q05ozVU8ZHwAAAVM"]
[Sun Mar 15 22:51:35.141805 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:57.125797 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60370] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:52:02.210571 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:47300] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdiQnbQATo66fKoS7wQXQAAANU"]
[Sun Mar 15 22:52:19.123091 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:52:41.101825 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:02.125814 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:32794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:23.102645 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:45.125910 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:06.099219 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:27.121787 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:49.131397 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:10.121897 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:31.108537 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:55.118224 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:56:16.129764 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:56:25.806146 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:43564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdjSZqj1wV0Si-OkeesXgAAABc"]
[Sun Mar 15 22:56:40.129874 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:01.120445 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:07.143239 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.228.16:35472] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdjc5qj1wV0Si-OkeesagAAAAk"]
[Sun Mar 15 22:57:23.122337 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:44.033911 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:06.125786 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:28.156893 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:49.433859 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:11.061687 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:32.046010 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:53.053827 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:14.057881 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:35.133794 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:57.113386 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:18.129788 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:39.122904 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:45.013859 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.244.31:58418] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdkiXbQATo66fKoS7wRAwAAANI"]
[Sun Mar 15 23:02:06.141791 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:02:27.084179 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.228.16:57920] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdks3bQATo66fKoS7wRFQAAAMg"]
[Sun Mar 15 23:02:28.122825 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:02:49.131031 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:11.105451 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:32.073570 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:53.131357 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:16.122137 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:37.122720 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:58.081831 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:05:20.035702 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:05:41.129869 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:03.125769 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:24.038085 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:45.137821 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:53.873931 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:50314] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdlvQlT9VtDQc7bgUxdmQAAARQ"]
[Sun Mar 15 23:07:06.080469 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:07:27.109839 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:07:37.778095 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:40670] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdl6dSswJuvopo3lOgrGAAAAJI"]
[Sun Mar 15 23:07:49.110034 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:10.130146 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:32.143258 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:53.123194 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:14.132551 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:37.139073 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39894] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:59.144020 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:10:21.125826 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:10:42.131313 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:03.841901 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:26.113944 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:47.133917 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:08.121219 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:29.094003 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41108] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:51.063839 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:00.541684 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.228.16:41012] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdnKwlT9VtDQc7bgUxd5QAAAQg"]
[Sun Mar 15 23:13:12.121798 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:34.126650 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:55.125789 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:17.123155 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:38.117891 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:59.144580 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:15:21.122514 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:15:42.130980 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:04.129817 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:25.125831 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:47.124261 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:08.129861 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:24.348642 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.244.31:35170] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdoNAlT9VtDQc7bgUxeLAAAAQo"]
[Sun Mar 15 23:17:29.029859 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:50.812156 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:02.700272 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:52228] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdoWnbQATo66fKoS7wSIgAAAMo"]
[Sun Mar 15 23:18:12.122106 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:34.129818 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:55.122294 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:16.078064 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:38.045921 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:59.125795 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:20:20.129949 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:20:43.133926 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:04.133815 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:26.137802 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:48.061985 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:09.126401 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:30.133765 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:50.133198 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:39806] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdpenjZBu2q05ozVU8a4wAAAUM"]
[Sun Mar 15 23:22:51.077802 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:12.057974 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:21.050333 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.228.16:46910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdpmQlT9VtDQc7bgUxefwAAAQE"]
[Sun Mar 15 23:23:34.129814 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:55.069821 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:16.101836 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:37.133817 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:58.049837 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:25:20.117797 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:25:41.049852 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:04.105271 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:25.070693 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:46.129882 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:10.129837 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:31.129912 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:52.057895 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:28:00.912200 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.244.31:54194] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdqsAlT9VtDQc7bgUxe_wAAAQE"]
[Sun Mar 15 23:28:13.033821 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:28:30.894942 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.228.16:48760] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdqzpqj1wV0Si-OkeeuwwAAAAw"]
[Sun Mar 15 23:28:34.129786 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:00.129817 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:21.041898 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:42.133820 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:04.126058 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:25.125852 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:46.117797 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48376] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:07.130084 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:28.113917 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:49.131486 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:10.131628 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:32.125806 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:53.129007 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49570] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:14.125944 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:26.226965 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.244.31:33182] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdr9nbQATo66fKoS7wTGAAAAME"]
[Sun Mar 15 23:33:35.129814 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:54.544802 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:40280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdsEglT9VtDQc7bgUxgAwAAAQQ"]
[Sun Mar 15 23:33:56.133811 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:34:22.122010 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:34:43.129798 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:05.236520 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:26.080324 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:48.123325 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:10.085906 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:31.085815 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51118] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:52.057943 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:14.133779 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:36.125855 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:57.133854 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:38:18.129855 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:38:28.912343 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:41426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdtJAlT9VtDQc7bgUxgfgAAAQs"]
[Sun Mar 15 23:38:40.105222 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:01.133777 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:04.752311 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.228.16:43142] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdtSHbQATo66fKoS7wTbwAAAME"]
[Sun Mar 15 23:39:22.129804 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:43.141837 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:04.121818 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:27.136013 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:49.130198 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:10.069822 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:31.129904 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:52.160983 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:13.131926 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:37.413798 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:59.131481 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:20.129815 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:41.063599 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:49.691872 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.244.31:48550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abduZQlT9VtDQc7bgUxhCQAAAQA"]
[Sun Mar 15 23:44:02.129865 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:44:23.141798 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:44:44.129878 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:05.137913 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:26.122982 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:48.125845 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:11.125797 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:32.125779 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:53.129811 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:14.125847 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56828] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:35.129832 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:57.133810 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:48:19.129863 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:48:41.126006 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:02.133829 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:23.135960 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:44.122116 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:05.119227 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:26.137778 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:48.119429 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:10.033877 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:31.125925 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:54.121817 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:15.128488 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:36.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:57.125784 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:53:18.145895 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:53:41.097904 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:02.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33344] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:22.446348 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:50538] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdw3rABkC4fWIHEf8G3NQAAAFY"]
[Sun Mar 15 23:54:24.149915 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:46.119817 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:58.765682 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.228.16:40986] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdxAv9ocpUE4ed4uDy7dQAAAhQ"]
[Sun Mar 15 23:55:53.117802 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:56:14.089932 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:56:40.095984 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:01.069910 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:22.125896 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36118] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:44.122006 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:06.045850 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:27.133784 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:49.134612 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:10.121776 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:32.134252 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:34.609138 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.244.31:53648] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdyFglT9VtDQc7bgUxicQAAAQY"]
[Sun Mar 15 23:59:53.121779 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:07.565634 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.228.16:41356] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdyNxXjF1vJNtV6CWrFaAAAAdM"]
[Mon Mar 16 00:00:14.125820 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37272] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:35.134497 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:56.033860 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37562] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:01:17.050150 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:01:38.138359 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:01.133822 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38006] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:22.149980 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:43.125780 2026] [proxy_fcgi:error] [pid 10709:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38382] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:05.137797 2026] [proxy_fcgi:error] [pid 10651:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38544] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:26.106684 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:48.129793 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38780] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:11.129884 2026] [proxy_fcgi:error] [pid 10831:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:33.129790 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39086] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:54.129805 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:57.632284 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:49090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdzWdSswJuvopo3lOgvIgAAAII"]
[Mon Mar 16 00:05:15.157829 2026] [proxy_fcgi:error] [pid 10831:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:05:37.112474 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:05:39.490589 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.228.16:56374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdzg7ABkC4fWIHEf8G3nQAAAEw"]
[Mon Mar 16 00:05:59.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39632] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:06:20.053806 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39780] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:06:42.121802 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:03.041877 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:24.133792 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40298] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:47.165789 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:08.135505 2026] [proxy_fcgi:error] [pid 10709:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:29.057819 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40888] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:50.132376 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:11.145810 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:33.131460 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41516] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:54.125822 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:08.881892 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.244.31:38886] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd0kLysWC90G-1nBrATkQAAAZA"]
[Mon Mar 16 00:10:16.122507 2026] [proxy_fcgi:error] [pid 10651:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:37.124730 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:47.214933 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.228.16:47202] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd0txXjF1vJNtV6CWrF3wAAAcc"]
[Mon Mar 16 00:10:58.125800 2026] [proxy_fcgi:error] [pid 10772:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42124] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:11:19.087442 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:11:40.132772 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:03.144074 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42746] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:24.122518 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:45.153812 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:08.140336 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43396] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:29.103715 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:51.136300 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43782] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:14:17.127961 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:14:39.117811 2026] [proxy_fcgi:error] [pid 10651:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:00.129864 2026] [proxy_fcgi:error] [pid 10831:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:21.125824 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44548] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:42.133794 2026] [proxy_fcgi:error] [pid 10651:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44786] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:03.133787 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44974] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:06.752922 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.228.16:59220] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd19hXjF1vJNtV6CWrGaAAAAdU"]
[Mon Mar 16 00:16:25.057801 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45188] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:46.057825 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:07.122643 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:28.135175 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:50.137823 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45770] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:11.140345 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45916] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:32.141777 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46040] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:53.125823 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46190] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:19:14.114294 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46380] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:19:38.085865 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46554] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:00.113906 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46850] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:21.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47128] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:36.098770 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.244.31:37738] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd3BNSswJuvopo3lOgvzgAAAJE"]
[Mon Mar 16 00:20:42.131406 2026] [proxy_fcgi:error] [pid 10772:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47342] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:03.126725 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:11.071329 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.228.16:54208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd3JwlT9VtDQc7bgUxkWAAAARM"]
[Mon Mar 16 00:21:24.045856 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:45.129566 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:07.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48150] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:28.131959 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48318] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:49.134861 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48536] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:10.119065 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48718] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:32.094929 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48896] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:53.094181 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49064] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:14.122236 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:35.127322 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49448] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:56.033823 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49656] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:25:18.122303 2026] [proxy_fcgi:error] [pid 10831:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:25:43.033795 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50054] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:04.129283 2026] [proxy_fcgi:error] [pid 10831:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50194] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:17.673229 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.244.31:43860] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd4WQlT9VtDQc7bgUxkzQAAAQ0"]
[Mon Mar 16 00:26:25.137796 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:34.363180 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.228.16:43308] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd4ao6lpbStxTqkSks5bQAAAkQ"]
[Mon Mar 16 00:26:47.078030 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:08.289256 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:29.492613 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51004] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:51.121912 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51216] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:13.139670 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:34.127033 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51490] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:55.129794 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:16.045848 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:37.021913 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51884] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:58.129817 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52042] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:30:20.133146 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:30:41.057829 2026] [proxy_fcgi:error] [pid 10831:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:04.128667 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52488] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:27.129783 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:48.131504 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:09.129845 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:13.308254 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:41638] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd5vXjZBu2q05ozVU8fygAAAUk"]
[Mon Mar 16 00:32:30.133822 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:48.462826 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:45582] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd54LABkC4fWIHEf8G4tQAAAE4"]
[Mon Mar 16 00:32:51.139589 2026] [proxy_fcgi:error] [pid 10831:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53116] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:12.057829 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:35.133793 2026] [proxy_fcgi:error] [pid 10772:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53524] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:56.130039 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:17.122978 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:38.123436 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53944] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:59.077829 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:35:20.125865 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54252] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:35:42.120514 2026] [proxy_fcgi:error] [pid 10709:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54394] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:03.130074 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54556] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:25.137884 2026] [proxy_fcgi:error] [pid 10709:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54712] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:46.033881 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54830] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:10.133907 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:19.155093 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:60096] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd677ABkC4fWIHEf8G44QAAAEw"]
[Mon Mar 16 00:37:31.124776 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55162] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:52.149898 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55312] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:53.299780 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:36614] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd7EbABkC4fWIHEf8G49gAAAEs"]
[Mon Mar 16 00:38:13.134107 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:38:34.129786 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:38:56.135224 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55786] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:39:21.033880 2026] [proxy_fcgi:error] [pid 10772:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:39:42.121730 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56110] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:03.127520 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56224] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:25.125818 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:47.123894 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:12.082046 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:33.069916 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56802] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:54.136637 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:15.095110 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57086] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:37.133960 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57258] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:40.147351 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.244.31:51486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd8MJqj1wV0Si-Okee0qQAAAAM"]
[Mon Mar 16 00:42:58.129824 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:43:13.357197 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:45854] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd8UQlT9VtDQc7bgUxlzgAAAQY"]
[Mon Mar 16 00:43:19.212721 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57496] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:43:40.066956 2026] [proxy_fcgi:error] [pid 10709:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:01.072032 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57802] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:22.069962 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57960] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:44.108044 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:05.102171 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:26.081166 2026] [proxy_fcgi:error] [pid 10772:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58346] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:49.129892 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58494] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:10.126184 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:31.133780 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58794] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:52.059690 2026] [proxy_fcgi:error] [pid 10709:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:14.418970 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:36.069901 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:48.797321 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.244.31:41258] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd9ZI6lpbStxTqkSks6JgAAAlA"]
[Mon Mar 16 00:47:57.125818 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:48:18.129839 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59540] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:48:39.149788 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:00.037861 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59832] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:21.129828 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:42.142310 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60104] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:03.125825 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60198] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:24.134593 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60278] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:46.133283 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:08.125783 2026] [proxy_fcgi:error] [pid 10772:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:29.130566 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60686] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:50.133776 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60854] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:12.025817 2026] [proxy_fcgi:error] [pid 10709:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60976] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:33.061836 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:54.125825 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:16.054289 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:37.137811 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33348] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:58.066614 2026] [proxy_fcgi:error] [pid 10651:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:54:19.121817 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33672] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:54:40.053820 2026] [proxy_fcgi:error] [pid 10831:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33768] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:01.118303 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:22.129855 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:43.120850 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34172] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:04.103733 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:26.134332 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34396] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:47.113877 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34516] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:08.077785 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34626] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:30.059429 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34730] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:51.135445 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:12.120722 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35012] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:21.879565 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:57938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd_3Zqj1wV0Si-Okee1DwAAABg"]
[Mon Mar 16 00:58:33.068559 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:42.271074 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.228.16:60250] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd_8v9ocpUE4ed4uDy-hwAAAgk"]
[Mon Mar 16 00:58:54.121798 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35296] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:15.121831 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:36.133848 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:57.089853 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35634] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:00:18.061989 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35764] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:00:39.125806 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:00.125803 2026] [proxy_fcgi:error] [pid 10651:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:21.058344 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36072] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:43.034174 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36164] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:04.073106 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:25.121766 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36426] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:47.045830 2026] [proxy_fcgi:error] [pid 10651:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36574] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:09.046019 2026] [proxy_fcgi:error] [pid 10651:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36696] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:30.033957 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36826] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:39.853213 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.244.31:40258] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeBG_9ocpUE4ed4uDy-qAAAAgU"]
[Mon Mar 16 01:03:51.133824 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37010] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:04.104233 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.228.16:46350] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeBNBXjF1vJNtV6CWrH_QAAAco"]
[Mon Mar 16 01:04:12.136725 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:33.070261 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:54.129785 2026] [proxy_fcgi:error] [pid 10772:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37374] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:15.125885 2026] [proxy_fcgi:error] [pid 10709:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:36.129781 2026] [proxy_fcgi:error] [pid 10651:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:57.057995 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:06:19.152239 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:06:40.112050 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:02.133780 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38150] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:23.060051 2026] [proxy_fcgi:error] [pid 10651:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:44.129857 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38442] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:05.125839 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:26.129852 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:47.085974 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:47.628301 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.244.31:41044] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeCT5qj1wV0Si-Okee1iwAAAAk"]
[Mon Mar 16 01:09:06.918890 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.228.16:42448] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeCYo6lpbStxTqkSks69gAAAkU"]
[Mon Mar 16 01:09:09.129826 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39052] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:09:30.097832 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:09:51.045897 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:12.118311 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:33.126487 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:58.197956 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:11:16.562304 2026] [core:alert] [pid 10772:tid 140411708356352] [client 13.38.45.165:37226] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 01:11:19.422903 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] [client 5.35.38.15:59784] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/
[Mon Mar 16 01:11:21.045859 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39952] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:11:43.062339 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:05.097925 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40340] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:26.121799 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:47.126476 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40656] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:08.045925 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:31.069884 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:52.101849 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:09.242891 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.244.31:56928] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeDkY6lpbStxTqkSks7GQAAAkU"]
[Mon Mar 16 01:14:13.057899 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41178] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:28.240149 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:59432] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeDpAlT9VtDQc7bgUxnhQAAAQY"]
[Mon Mar 16 01:14:35.057958 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:56.129714 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41500] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:15:18.125309 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41682] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:15:39.141783 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:00.140077 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41916] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:22.117724 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:44.129829 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:05.082247 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42424] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:28.083057 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42580] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:50.128736 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42740] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:11.111345 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:33.085802 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:54.139673 2026] [proxy_fcgi:error] [pid 10709:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:15.133773 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:35.204841 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.228.16:60866] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeE17ABkC4fWIHEf8G6gAAAAEU"]
[Mon Mar 16 01:19:36.125871 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:57.128096 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:20:18.129835 2026] [proxy_fcgi:error] [pid 10709:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:20:40.131430 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43760] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:01.030332 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:22.129775 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44108] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:25.815122 2026] [:error] [pid 11972:tid 140411548894976] [client 209.38.248.17:60938] [client 209.38.248.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "<\\\\?(?!xml|xpacket)" at ARGS_NAMES:<?php $env["USERNAME"] . [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "6"] [id "959151"] [rev "2"] [msg "PHP Injection Attack"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/php-cgi/php-cgi.exe"] [unique_id "abeFRZqj1wV0Si-Okee2PwAAABc"]
[Mon Mar 16 01:21:25.816398 2026] [:error] [pid 21805:tid 140411607643904] [client 159.223.132.86:42260] [client 159.223.132.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "<\\\\?(?!xml|xpacket)" at ARGS_NAMES:<?php $env["USERNAME"] . [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "6"] [id "959151"] [rev "2"] [msg "PHP Injection Attack"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/php-cgi/php-cgi.exe"] [unique_id "abeFRLABkC4fWIHEf8G6oAAAAFA"]
[Mon Mar 16 01:21:26.151346 2026] [access_compat:error] [pid 11972:tid 140411565680384] [client 159.223.132.86:42264] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 01:21:26.714818 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 209.38.248.17:60948] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 01:21:43.140412 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:05.125811 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44394] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:26.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44530] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:50.077827 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44658] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:11.130633 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:32.149769 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44868] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:54.121468 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45068] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:15.121944 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45200] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:36.142042 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:36.202442 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:35344] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeGBJqj1wV0Si-Okee2bQAAABc"]
[Mon Mar 16 01:24:50.110356 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.228.16:56600] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeGErysWC90G-1nBrAWhgAAAY0"]
[Mon Mar 16 01:24:57.113723 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:25:18.120651 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45620] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:25:39.045845 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:08.122856 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45992] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:32.131288 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:54.126030 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:27:17.128555 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:27:38.089823 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:00.131169 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:21.053817 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47264] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:42.126375 2026] [proxy_fcgi:error] [pid 10831:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:03.069964 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:24.129844 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:40.201085 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.244.31:57682] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeHNLABkC4fWIHEf8G68wAAAEc"]
[Mon Mar 16 01:29:45.129805 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47906] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:54.833613 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.228.16:32952] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeHQnjZBu2q05ozVU8iNwAAAVY"]
[Mon Mar 16 01:30:06.109828 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:30:27.132186 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:30:48.130920 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:09.135409 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48408] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:30.133836 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:53.133816 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:16.131014 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:38.033795 2026] [proxy_fcgi:error] [pid 10651:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:59.129902 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49322] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:33:21.145883 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:33:42.148826 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49676] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:04.033801 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:26.070064 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49990] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:47.125821 2026] [proxy_fcgi:error] [pid 10709:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:02.267513 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:42370] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeIdrABkC4fWIHEf8G7HgAAAEs"]
[Mon Mar 16 01:35:08.141265 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:19.082016 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:57876] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeIhwlT9VtDQc7bgUxo-QAAAQY"]
[Mon Mar 16 01:35:29.120226 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:50.038508 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:11.089831 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50828] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:32.153307 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:53.131597 2026] [proxy_fcgi:error] [pid 10772:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:14.133813 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:37.149912 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51302] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:59.069847 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51454] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:38:21.141186 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:38:43.099567 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51714] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:04.119881 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:25.139321 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:47.122796 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:07.127730 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.244.31:33478] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeJpwlT9VtDQc7bgUxpTAAAAQw"]
[Mon Mar 16 01:40:08.125807 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52278] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:21.718705 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.228.16:34384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeJtZqj1wV0Si-Okee2_wAAABY"]
[Mon Mar 16 01:40:29.033994 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:50.135989 2026] [proxy_fcgi:error] [pid 10772:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52644] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:11.121988 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:32.249845 2026] [proxy_fcgi:error] [pid 10831:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52836] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:54.131312 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:15.041848 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53142] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:38.129918 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:59.057330 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:43:20.415111 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53546] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:43:43.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53696] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:05.131190 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:26.129875 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:48.133860 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:10.133778 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:30.883917 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.244.31:45932] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeK6rysWC90G-1nBrAXOQAAAYE"]
[Mon Mar 16 01:45:31.129838 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54576] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:41.630136 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:54782] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeK9Y6lpbStxTqkSks8dgAAAlQ"]
[Mon Mar 16 01:45:57.123902 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54754] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:46:18.029857 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54962] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:46:40.125890 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:01.129837 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55296] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:22.129874 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:43.136405 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:04.129848 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55734] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:25.098818 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:46.133797 2026] [proxy_fcgi:error] [pid 10831:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:08.125807 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56088] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:29.133800 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56210] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:50.129773 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56354] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:11.673785 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:33.130112 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:54.137849 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56716] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:15.125834 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:36.117838 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56878] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:43.733812 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.244.31:33214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeMXxXjF1vJNtV6CWrJjAAAAc4"]
[Mon Mar 16 01:52:01.069852 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57074] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:52:22.137822 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57142] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:52:43.137821 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57244] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:04.126939 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57428] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:25.037856 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:46.119626 2026] [proxy_fcgi:error] [pid 10709:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57754] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:07.121790 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57892] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:31.129785 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:53.133917 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:14.126507 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58242] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:35.069877 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:57.857805 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58538] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:56:19.133779 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58678] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:56:40.113880 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:01.077803 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58978] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:22.109541 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:43.106518 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:04.133782 2026] [proxy_fcgi:error] [pid 10831:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:25.137806 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59668] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:46.069911 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:07.057907 2026] [proxy_fcgi:error] [pid 10709:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59946] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:28.133817 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60104] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:50.121897 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60270] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:14.129814 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:35.129853 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:56.029961 2026] [proxy_fcgi:error] [pid 10709:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60844] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:01:18.860317 2026] [proxy_fcgi:error] [pid 10709:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:01:40.115754 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:01.134057 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33154] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:15.361226 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:57542] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeO146lpbStxTqkSks9WgAAAkw"]
[Mon Mar 16 02:02:22.134283 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33406] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:23.513528 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.228.16:49444] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeO3_9ocpUE4ed4uDzA4wAAAgw"]
[Mon Mar 16 02:02:43.133974 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:04.157819 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33686] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:25.126684 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33806] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:46.125921 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33930] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:07.141793 2026] [proxy_fcgi:error] [pid 10831:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34076] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:22.029954 2026] [mime_magic:error] [pid 21946:tid 140411674785536] (70014)End of file found: [client 34.206.76.135:58831] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 02:04:22.030443 2026] [access_compat:error] [pid 21946:tid 140411674785536] [client 34.206.76.135:58831] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Mon Mar 16 02:04:33.041903 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:55.913526 2026] [proxy_fcgi:error] [pid 10651:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34370] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:17.083827 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:38.069815 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:59.141945 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34812] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:06:20.125955 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:06:42.122771 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35130] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:04.077903 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:18.901908 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:46200] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeQBrABkC4fWIHEf8G8jgAAAFA"]
[Mon Mar 16 02:07:25.129774 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:26.626850 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:37574] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeQDnbQATo66fKoS7wbggAAAMw"]
[Mon Mar 16 02:07:46.133827 2026] [proxy_fcgi:error] [pid 10709:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35508] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:07.133930 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:28.131700 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:50.125901 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:11.033823 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36106] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:32.133812 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:53.021855 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:10:17.129797 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:10:39.037948 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:00.125831 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:21.132905 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:42.069827 2026] [proxy_fcgi:error] [pid 10709:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37270] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:12:28.125858 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:12:45.842673 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.228.16:55454] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeRTRXjF1vJNtV6CWrLDAAAAdg"]
[Mon Mar 16 02:12:46.544755 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.244.31:40298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeRThXjF1vJNtV6CWrLDgAAAcY"]
[Mon Mar 16 02:13:08.124221 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38560] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:13:29.129850 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:13:50.129768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38894] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:11.129831 2026] [proxy_fcgi:error] [pid 10831:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:32.033860 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39212] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:53.041917 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:14.121992 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:36.121860 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39634] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:57.137758 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:16:19.389777 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39962] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:16:41.125784 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40120] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:02.129151 2026] [proxy_fcgi:error] [pid 10651:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40308] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:24.070458 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:45.133854 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:47.451321 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.228.16:33440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeSewlT9VtDQc7bgUxs3AAAARA"]
[Mon Mar 16 02:17:52.858742 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.244.31:54628] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeSgLysWC90G-1nBrAYwwAAAZM"]
[Mon Mar 16 02:18:06.145815 2026] [proxy_fcgi:error] [pid 10651:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:18:27.144675 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:18:51.121795 2026] [proxy_fcgi:error] [pid 10709:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41238] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:13.138078 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:34.091678 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:55.134534 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41718] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:20:21.133846 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:20:43.140988 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42006] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:04.121808 2026] [proxy_fcgi:error] [pid 10772:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:25.129837 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:46.069829 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:07.117827 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42442] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:28.167116 2026] [proxy_fcgi:error] [pid 10831:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:49.117801 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:10.115397 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:15.776008 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:59194] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeTw5qj1wV0Si-Okee6EgAAABg"]
[Mon Mar 16 02:23:32.137805 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:53.146872 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43166] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:14.124495 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43338] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:35.130170 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43512] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:56.029878 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:25:17.130263 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43756] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:25:42.144131 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43934] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:05.145979 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44164] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:26.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44320] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:47.143738 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:08.122759 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44670] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:29.053786 2026] [proxy_fcgi:error] [pid 10831:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:50.121790 2026] [proxy_fcgi:error] [pid 10831:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44898] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:11.133803 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45026] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:21.302886 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:41624] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeU9Zqj1wV0Si-Okee6JQAAAA4"]
[Mon Mar 16 02:28:25.502608 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.244.31:51008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeU-Y6lpbStxTqkSks_CAAAAkY"]
[Mon Mar 16 02:28:32.057863 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45158] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:54.045920 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45312] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:16.084558 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:38.093819 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:56.700311 2026] [access_compat:error] [pid 10772:tid 140411607643904] [client 45.148.10.174:37170] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 02:29:59.045967 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:30:09.537933 2026] [core:alert] [pid 11972:tid 140411658000128] [client 45.148.10.174:58556] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 02:30:10.768896 2026] [mime_magic:error] [pid 21806:tid 140411691570944] (70014)End of file found: [client 45.148.10.174:40064] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 02:30:17.366699 2026] [access_compat:error] [pid 10651:tid 140411741927168] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 02:30:17.574214 2026] [access_compat:error] [pid 10651:tid 140411607643904] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 02:30:17.808731 2026] [access_compat:error] [pid 10651:tid 140411548894976] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 02:30:21.037785 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45762] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:30:42.137806 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45862] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:03.121863 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45994] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:27.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:48.137854 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46298] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:09.133804 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:30.126914 2026] [proxy_fcgi:error] [pid 10709:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46536] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:51.122259 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46676] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:12.117224 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:33.085154 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47054] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:43.499961 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.228.16:41042] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeWN46lpbStxTqkSks_NwAAAkA"]
[Mon Mar 16 02:33:46.728899 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:36010] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeWOnbQATo66fKoS7wcRwAAAMs"]
[Mon Mar 16 02:33:54.117777 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:15.127371 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:38.077919 2026] [proxy_fcgi:error] [pid 10831:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:59.127539 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:35:25.133857 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:35:46.048460 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48016] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:07.133937 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:29.129849 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:50.037894 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48492] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:11.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48640] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:32.122279 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:53.127214 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:15.153866 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49112] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:36.138666 2026] [proxy_fcgi:error] [pid 10831:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49238] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:44.210440 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.228.16:42932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeXZJqj1wV0Si-Okee7MgAAAAE"]
[Mon Mar 16 02:38:50.001591 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:40952] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeXadSswJuvopo3lOg1_QAAAIM"]
[Mon Mar 16 02:38:58.123567 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:39:19.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49626] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:39:40.133933 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:01.122144 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50004] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:22.141853 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:47.125886 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:08.113606 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:30.393929 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50642] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:52.045882 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50778] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:13.125917 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50910] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:34.137861 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:55.037869 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51130] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:16.106128 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51202] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:37.131036 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:58.102056 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:44:02.091285 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.228.16:33802] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeYoglT9VtDQc7bgUxu8QAAAQ4"]
[Mon Mar 16 02:44:19.125888 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51562] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:44:38.360069 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.244.31:38470] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeYxhXjF1vJNtV6CWrM-QAAAc8"]
[Mon Mar 16 02:44:40.062005 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51680] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:01.084618 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51808] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:23.543307 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:45.125804 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:10.087184 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52332] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:31.134943 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52436] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:53.071022 2026] [proxy_fcgi:error] [pid 10651:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:15.137823 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:36.113887 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:57.126127 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:48:18.137847 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:48:39.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:00.121417 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53400] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:21.133792 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:42.129940 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:03.133841 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53730] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:13.474489 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.228.16:48482] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeaFQlT9VtDQc7bgUxvrAAAARc"]
[Mon Mar 16 02:50:24.129793 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53862] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:34.975009 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.244.31:54900] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeaKnbQATo66fKoS7wdNwAAANQ"]
[Mon Mar 16 02:50:45.115806 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:06.084465 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:29.125946 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:52.134108 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:14.074020 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54512] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:37.057987 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:58.131363 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:53:20.128134 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55034] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:53:41.130297 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:02.118155 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55310] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:23.125800 2026] [proxy_fcgi:error] [pid 10651:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:44.129184 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55588] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:05.121442 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55716] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:26.125957 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55814] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:35.593114 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.244.31:58692] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abebVxXjF1vJNtV6CWrNaQAAAck"]
[Mon Mar 16 02:55:47.127263 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:08.033784 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:29.127744 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:50.110004 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56340] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:13.137789 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:35.118247 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56602] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:59.117868 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:58:21.137834 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:58:42.138662 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:04.120010 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:25.049573 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57524] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:46.129980 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:07.129807 2026] [proxy_fcgi:error] [pid 10709:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:28.129817 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58098] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:49.151466 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:10.125806 2026] [proxy_fcgi:error] [pid 10831:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58448] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:31.106389 2026] [proxy_fcgi:error] [pid 10831:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58600] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:52.129796 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58746] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:13.121875 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58918] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:34.116794 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59036] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:58.045838 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:03:20.126204 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59404] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:03:42.085648 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59568] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:03.057864 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:26.129813 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:47.033809 2026] [proxy_fcgi:error] [pid 10831:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60090] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:09.625857 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:31.097919 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60434] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:52.081798 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60692] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:57.429209 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.228.16:43778] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abedxRXjF1vJNtV6CWrN3wAAAcs"]
[Mon Mar 16 03:06:13.046053 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60848] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:06:14.664761 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:57412] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abed1tSswJuvopo3lOg3HAAAAIo"]
[Mon Mar 16 03:06:34.121804 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:32842] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:06:56.135134 2026] [proxy_fcgi:error] [pid 10772:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:17.121682 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:38.139340 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:59.121852 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:08:20.131486 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:08:42.097807 2026] [proxy_fcgi:error] [pid 10831:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33762] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:03.126466 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33902] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:24.142105 2026] [proxy_fcgi:error] [pid 10709:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:48.529515 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:10.125794 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:33.128169 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34430] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:54.125791 2026] [proxy_fcgi:error] [pid 10651:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:15.065847 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:18.189843 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.228.16:58008] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abefBhXjF1vJNtV6CWrN-QAAAcE"]
[Mon Mar 16 03:11:37.061953 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:42.483892 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:37264] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abefHrABkC4fWIHEf8HADQAAAFU"]
[Mon Mar 16 03:11:58.097994 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:12:20.493883 2026] [proxy_fcgi:error] [pid 10831:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:12:42.129400 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:03.137785 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:24.129784 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:31.163601 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] [client 179.188.53.243:35760] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.163646 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (104)Connection reset by peer: [client 179.188.53.243:35760] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.163962 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] [client 179.188.53.243:36094] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.163973 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:36094] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.165390 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] [client 179.188.53.243:35938] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.165422 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (104)Connection reset by peer: [client 179.188.53.243:35938] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.165952 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] [client 179.188.53.243:37060] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.165984 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:37060] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.166405 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] [client 179.188.53.243:35648] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.166434 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (104)Connection reset by peer: [client 179.188.53.243:35648] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.175623 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] [client 179.188.53.243:36490] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.175651 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:36490] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.175926 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] [client 179.188.53.243:36362] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.175936 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:36362] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.176126 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] [client 179.188.53.243:36230] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176138 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:36230] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.176323 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] [client 179.188.53.243:37156] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176332 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:37156] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.176543 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] [client 179.188.53.243:36778] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176572 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:36778] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.181775 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] [client 179.188.53.243:36658] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.181817 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:36658] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.182023 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] [client 179.188.53.243:37248] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.182042 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (104)Connection reset by peer: [client 179.188.53.243:37248] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.182675 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] [client 179.188.53.243:36914] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.182692 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:36914] AH01075: Error dispatching request to :
[Mon Mar 16 03:13:31.185158 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] [client 69.197.179.242:33130] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-includes/imddc187/edit.php?id=212809
[Mon Mar 16 03:13:31.185175 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (104)Connection reset by peer: [client 69.197.179.242:33130] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-includes/imddc187/edit.php?id=212809
[Mon Mar 16 03:13:31.190388 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] [client 179.188.53.243:37324] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.190423 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:37324] AH01075: Error dispatching request to :
[Mon Mar 16 03:16:27.043640 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.228.16:45364] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abegO5qj1wV0Si-Okee9cwAAAA0"]
[Mon Mar 16 03:16:53.608392 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:47626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abegVXbQATo66fKoS7wfRwAAAMs"]
[Mon Mar 16 03:21:49.122820 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.228.16:55606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abehfZqj1wV0Si-Okee9qgAAAAE"]
[Mon Mar 16 03:22:17.086365 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:36604] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abehmZqj1wV0Si-Okee9qwAAABU"]
[Mon Mar 16 03:26:53.456773 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.228.16:34034] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeirY6lpbStxTqkSktBpwAAAko"]
[Mon Mar 16 03:32:11.003709 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.228.16:44152] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abej63jZBu2q05ozVU8oaQAAAVc"]
[Mon Mar 16 03:32:50.595105 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:57432] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abekEtSswJuvopo3lOg4dgAAAIM"]
[Mon Mar 16 03:37:19.830054 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:53586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abelH3jZBu2q05ozVU8orwAAAUU"]
[Mon Mar 16 03:37:56.087966 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:33016] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abelRHjZBu2q05ozVU8otQAAAVg"]
[Mon Mar 16 03:42:47.976275 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:60770] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abemZ46lpbStxTqkSktCPwAAAlQ"]
[Mon Mar 16 03:43:19.683153 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:43480] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abemh9SswJuvopo3lOg5gwAAAIY"]
[Mon Mar 16 03:47:57.990787 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.228.16:38036] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abennY6lpbStxTqkSktCawAAAlY"]
[Mon Mar 16 03:49:28.826788 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.244.31:53350] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aben-HjZBu2q05ozVU8pgwAAAU4"]
[Mon Mar 16 03:53:26.421225 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.228.16:35054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeo5nbQATo66fKoS7wgwwAAANg"]
[Mon Mar 16 03:54:36.486917 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.244.31:55686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abepLAlT9VtDQc7bgUx1rgAAAQY"]
[Mon Mar 16 04:00:04.539472 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:60352] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeqdNSswJuvopo3lOg6QAAAAIY"]
[Mon Mar 16 04:09:06.110200 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:38440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abesknbQATo66fKoS7whpQAAAMw"]
[Mon Mar 16 04:10:36.574849 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.244.31:33726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abes7Jqj1wV0Si-OkefARgAAAAs"]
[Mon Mar 16 04:14:29.430639 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:42796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abet1Zqj1wV0Si-OkefAbQAAAAg"]
[Mon Mar 16 04:15:47.123005 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:44652] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeuI9SswJuvopo3lOg60wAAAII"]
[Mon Mar 16 04:19:39.681143 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:41922] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abevC9SswJuvopo3lOg66gAAAJM"]
[Mon Mar 16 04:21:19.523214 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:45066] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abevb7ABkC4fWIHEf8HDPQAAAFc"]
[Mon Mar 16 04:25:09.619546 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:42538] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abewVdSswJuvopo3lOg7DQAAAIw"]
[Mon Mar 16 04:25:51.686148 2026] [mime_magic:error] [pid 21533:tid 140411658000128] (70014)End of file found: [client 82.97.199.54:40113] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 04:26:21.935348 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.244.31:53512] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abewnXjZBu2q05ozVU8sLwAAAVE"]
[Mon Mar 16 04:30:20.402557 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.228.16:48816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abexjLysWC90G-1nBrAe3QAAAYE"]
[Mon Mar 16 04:35:42.102499 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.228.16:45832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeyzhXjF1vJNtV6CWrTDwAAAcI"]
[Mon Mar 16 04:36:45.209900 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:52524] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abezDZqj1wV0Si-OkefBkgAAABE"]
[Mon Mar 16 04:40:46.299104 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.228.16:36900] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abez_njZBu2q05ozVU8tsAAAAVg"]
[Mon Mar 16 04:42:06.828071 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:35666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe0Tpqj1wV0Si-OkefBxQAAABA"]
[Mon Mar 16 04:46:13.429344 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:57530] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe1RdSswJuvopo3lOg8BAAAAJE"]
[Mon Mar 16 04:47:15.904643 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:55910] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe1g9SswJuvopo3lOg8CQAAAII"]
[Mon Mar 16 04:51:21.907401 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:35032] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe2eQlT9VtDQc7bgUx4vwAAARg"]
[Mon Mar 16 04:52:37.151965 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.244.31:53034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe2xXjZBu2q05ozVU8uYwAAAVA"]
[Mon Mar 16 04:56:46.331805 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.228.16:48992] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe3vhXjF1vJNtV6CWrT7AAAAcY"]
[Mon Mar 16 04:57:44.393367 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.244.31:46636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe3-BXjF1vJNtV6CWrT8wAAAc4"]
[Mon Mar 16 05:03:06.055762 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:59514] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe5OtSswJuvopo3lOg8wQAAAJM"]
[Mon Mar 16 05:07:59.007503 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gptsh.php
[Mon Mar 16 05:07:59.205249 2026] [access_compat:error] [pid 32654:tid 140411590858496] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wolv.php
[Mon Mar 16 05:07:59.406779 2026] [access_compat:error] [pid 32654:tid 140411683178240] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lock.php
[Mon Mar 16 05:07:59.608281 2026] [access_compat:error] [pid 32654:tid 140411674785536] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/edorxrr.php
[Mon Mar 16 05:07:59.809616 2026] [access_compat:error] [pid 32654:tid 140411599251200] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ox.php
[Mon Mar 16 05:08:00.004909 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1754569357_be.php
[Mon Mar 16 05:08:00.204581 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-kd4xalrg7m.php
[Mon Mar 16 05:08:00.399930 2026] [access_compat:error] [pid 32654:tid 140411557287680] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hplfuns.php
[Mon Mar 16 05:08:00.600455 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test2.php
[Mon Mar 16 05:08:00.795485 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cah.php
[Mon Mar 16 05:08:00.993882 2026] [access_compat:error] [pid 32654:tid 140411548894976] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/boltt.php
[Mon Mar 16 05:08:01.195314 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/100.php
[Mon Mar 16 05:08:01.396136 2026] [access_compat:error] [pid 10831:tid 140411683178240] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rand.php
[Mon Mar 16 05:08:01.591009 2026] [access_compat:error] [pid 10831:tid 140411641214720] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/randoms.php
[Mon Mar 16 05:08:01.788287 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1998.php
[Mon Mar 16 05:08:01.982470 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wtiiy.php
[Mon Mar 16 05:08:02.183267 2026] [access_compat:error] [pid 10831:tid 140411666392832] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sxb.php
[Mon Mar 16 05:08:02.387908 2026] [access_compat:error] [pid 10831:tid 140411557287680] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-mter.php
[Mon Mar 16 05:08:02.584629 2026] [access_compat:error] [pid 10831:tid 140411540502272] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Mon Mar 16 05:08:02.780339 2026] [access_compat:error] [pid 10831:tid 140411582465792] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hc.php
[Mon Mar 16 05:08:02.976432 2026] [access_compat:error] [pid 10831:tid 140411632822016] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Mon Mar 16 05:08:03.181311 2026] [access_compat:error] [pid 10831:tid 140411658000128] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/awh.php
[Mon Mar 16 05:08:03.377669 2026] [access_compat:error] [pid 10831:tid 140411708356352] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yussef.php
[Mon Mar 16 05:08:03.572686 2026] [access_compat:error] [pid 10831:tid 140411725141760] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0771dccd2958b85d48125d146d77e038akc.php
[Mon Mar 16 05:08:03.791001 2026] [access_compat:error] [pid 10831:tid 140411741927168] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/19.php
[Mon Mar 16 05:08:03.986839 2026] [access_compat:error] [pid 10831:tid 140411691570944] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb5.php
[Mon Mar 16 05:08:04.191554 2026] [access_compat:error] [pid 10831:tid 140411716749056] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fe5.php
[Mon Mar 16 05:08:04.387972 2026] [access_compat:error] [pid 10831:tid 140411565680384] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp11.php
[Mon Mar 16 05:08:04.585839 2026] [access_compat:error] [pid 10831:tid 140411624429312] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file61.php
[Mon Mar 16 05:08:04.781860 2026] [access_compat:error] [pid 10831:tid 140411574073088] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/16.php
[Mon Mar 16 05:08:04.981484 2026] [access_compat:error] [pid 10831:tid 140411641214720] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb.php
[Mon Mar 16 05:08:05.179466 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ss.php
[Mon Mar 16 05:08:05.374864 2026] [access_compat:error] [pid 10831:tid 140411674785536] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/h2.php
[Mon Mar 16 05:08:05.570266 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-p2r3q9c8k4.php
[Mon Mar 16 05:08:05.770476 2026] [access_compat:error] [pid 10831:tid 140411666392832] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ty.php
[Mon Mar 16 05:08:05.971114 2026] [access_compat:error] [pid 10831:tid 140411548894976] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/albin.php
[Mon Mar 16 05:08:06.169200 2026] [access_compat:error] [pid 10831:tid 140411557287680] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Mon Mar 16 05:08:06.676581 2026] [access_compat:error] [pid 10831:tid 140411540502272] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 05:08:08.114046 2026] [access_compat:error] [pid 10709:tid 140411674785536] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fsgdjkl.php
[Mon Mar 16 05:08:08.312081 2026] [access_compat:error] [pid 10709:tid 140411590858496] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/uuu.php
[Mon Mar 16 05:08:08.511760 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/by.php
[Mon Mar 16 05:08:08.720459 2026] [access_compat:error] [pid 10709:tid 140411582465792] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Mon Mar 16 05:08:08.916835 2026] [access_compat:error] [pid 10709:tid 140411649607424] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/asw.php
[Mon Mar 16 05:08:09.111413 2026] [access_compat:error] [pid 10709:tid 140411666392832] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/eee.php
[Mon Mar 16 05:08:09.306562 2026] [access_compat:error] [pid 10709:tid 140411683178240] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lp6.php
[Mon Mar 16 05:08:09.515797 2026] [access_compat:error] [pid 10709:tid 140411699963648] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akses.php
[Mon Mar 16 05:08:09.714118 2026] [access_compat:error] [pid 10709:tid 140411548894976] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/no1.php
[Mon Mar 16 05:08:10.218859 2026] [access_compat:error] [pid 11972:tid 140411708356352] [client 20.203.144.43:50818] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/teee.php
[Mon Mar 16 05:08:10.414801 2026] [access_compat:error] [pid 32654:tid 140411649607424] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Mon Mar 16 05:08:10.609780 2026] [access_compat:error] [pid 32654:tid 140411599251200] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Mon Mar 16 05:08:10.804876 2026] [access_compat:error] [pid 32654:tid 140411708356352] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/kk.php
[Mon Mar 16 05:08:10.999895 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Mon Mar 16 05:08:11.198640 2026] [access_compat:error] [pid 32654:tid 140411624429312] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cs.php
[Mon Mar 16 05:08:11.402470 2026] [access_compat:error] [pid 32654:tid 140411666392832] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/w2025.php
[Mon Mar 16 05:08:11.599534 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/swallowable.php
[Mon Mar 16 05:08:11.799575 2026] [access_compat:error] [pid 32654:tid 140411557287680] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fvvff.php
[Mon Mar 16 05:08:11.994124 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a2.php
[Mon Mar 16 05:08:12.198617 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sty.php
[Mon Mar 16 05:08:12.396467 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/g.php
[Mon Mar 16 05:08:12.595895 2026] [access_compat:error] [pid 32654:tid 140411641214720] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pp.php
[Mon Mar 16 05:08:12.794926 2026] [access_compat:error] [pid 32654:tid 140411716749056] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sys.php
[Mon Mar 16 05:08:12.992068 2026] [access_compat:error] [pid 32654:tid 140411582465792] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Mon Mar 16 05:08:13.188751 2026] [access_compat:error] [pid 32654:tid 140411616036608] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp9.php
[Mon Mar 16 05:08:13.389232 2026] [access_compat:error] [pid 32654:tid 140411658000128] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Mon Mar 16 05:08:13.589579 2026] [access_compat:error] [pid 32654:tid 140411590858496] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wdf.php
[Mon Mar 16 05:08:13.786639 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/2.php
[Mon Mar 16 05:08:13.987104 2026] [access_compat:error] [pid 32654:tid 140411607643904] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wsvvs.php
[Mon Mar 16 05:08:14.180939 2026] [access_compat:error] [pid 32654:tid 140411674785536] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/3.php
[Mon Mar 16 05:12:20.977499 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:60916] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe7ZNSswJuvopo3lOg89AAAAIY"]
[Mon Mar 16 05:12:28.838045 2026] [access_compat:error] [pid 21805:tid 140411565680384] [client 45.3.49.177:50249] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:29.792305 2026] [access_compat:error] [pid 11972:tid 140411582465792] [client 45.3.49.177:63843] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:30.798620 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 45.3.49.177:50063] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:38.255629 2026] [access_compat:error] [pid 21533:tid 140411616036608] [client 209.50.160.105:18677] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:39.234739 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 209.50.160.105:60307] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:40.222165 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 209.50.160.105:16819] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:13:42.706311 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.244.31:60046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe7tglT9VtDQc7bgUx7ogAAAQc"]
[Mon Mar 16 05:15:50.465890 2026] [access_compat:error] [pid 10709:tid 140411557287680] [client 193.233.126.116:59586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:17:37.956073 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.228.16:42748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe8of9ocpUE4ed4uDzKTAAAAhE"]
[Mon Mar 16 05:18:57.760733 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:52564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe88dSswJuvopo3lOg9GAAAAJY"]
[Mon Mar 16 05:22:47.551221 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:57374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe919SswJuvopo3lOg9LwAAAIY"]
[Mon Mar 16 05:24:19.994603 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:38018] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe-M7ABkC4fWIHEf8HF9gAAAEY"]
[Mon Mar 16 05:28:07.926774 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.228.16:32966] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe_F5qj1wV0Si-OkefEzQAAABc"]
[Mon Mar 16 05:29:21.516407 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.244.31:59364] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe_Yf9ocpUE4ed4uDzK0AAAAgA"]
[Mon Mar 16 05:33:11.083558 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.228.16:40682] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfAR46lpbStxTqkSktHbgAAAkk"]
[Mon Mar 16 05:34:06.117116 2026] [access_compat:error] [pid 21805:tid 140411733534464] [client 185.196.111.169:11272] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:38:35.869853 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.228.16:47302] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfBi3bQATo66fKoS7wmXwAAAMc"]
[Mon Mar 16 05:39:47.980914 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.244.31:52452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfB046lpbStxTqkSktHmwAAAkM"]
[Mon Mar 16 05:43:39.740233 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.228.16:45092] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfCu7ABkC4fWIHEf8HHNwAAAFU"]
[Mon Mar 16 05:45:10.723019 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.244.31:44246] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfDFo6lpbStxTqkSktIRAAAAks"]
[Mon Mar 16 05:48:55.048638 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:43108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfD946lpbStxTqkSktIXwAAAkw"]
[Mon Mar 16 05:50:12.004563 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:46880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfERLABkC4fWIHEf8HHdAAAAEM"]
[Mon Mar 16 05:53:27.286190 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 203.100.215.216:53396] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:53:59.986205 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.228.16:51342] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfFJ_9ocpUE4ed4uDzLjAAAAgk"]
[Mon Mar 16 05:55:27.340024 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.244.31:49284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfFf7ABkC4fWIHEf8HHnQAAAFQ"]
[Mon Mar 16 05:59:25.379779 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:48692] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfGbXbQATo66fKoS7wnIgAAAMU"]
[Mon Mar 16 06:00:33.325025 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.244.31:44022] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfGsbABkC4fWIHEf8HHxAAAAE8"]
[Mon Mar 16 06:05:54.930494 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:56970] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfH8tSswJuvopo3lOg-pwAAAIA"]
[Mon Mar 16 06:14:59.644402 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:33738] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfKE46lpbStxTqkSktJfwAAAlM"]
[Mon Mar 16 06:16:26.666331 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:41220] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfKaglT9VtDQc7bgUyDXAAAARQ"]
[Mon Mar 16 06:20:25.917008 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:39648] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfLWXbQATo66fKoS7woCwAAANU"]
[Mon Mar 16 06:21:32.295532 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:33024] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfLnNSswJuvopo3lOg_CgAAAIs"]
[Mon Mar 16 06:25:32.540208 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:59732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfMjJqj1wV0Si-OkefHvQAAAAU"]
[Mon Mar 16 06:26:57.754505 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:34448] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfM4XbQATo66fKoS7wo6QAAAMs"]
[Mon Mar 16 06:30:58.011624 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.228.16:46334] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfN0RXjF1vJNtV6CWrY7QAAAco"]
[Mon Mar 16 06:32:03.138049 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.244.31:36472] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfOE3jZBu2q05ozVU8zlAAAAVY"]
[Mon Mar 16 06:36:05.245320 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.228.16:38552] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfPBbysWC90G-1nBrAkQwAAAY8"]
[Mon Mar 16 06:39:45.211508 2026] [access_compat:error] [pid 21806:tid 140411582465792] [client 170.168.99.127:17437] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:46.435650 2026] [access_compat:error] [pid 10831:tid 140411616036608] [client 193.203.9.125:39645] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:47.851732 2026] [access_compat:error] [pid 10772:tid 140411733534464] [client 193.202.83.82:16155] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:49.600485 2026] [access_compat:error] [pid 21533:tid 140411632822016] [client 185.168.29.109:52169] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:51.111464 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 170.168.96.71:40903] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:52.792767 2026] [access_compat:error] [pid 10772:tid 140411590858496] [client 45.159.21.229:41819] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:54.310666 2026] [access_compat:error] [pid 10651:tid 140411733534464] [client 83.97.117.172:29645] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:55.855934 2026] [access_compat:error] [pid 21946:tid 140411699963648] [client 185.61.222.241:12971] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:57.335639 2026] [access_compat:error] [pid 10709:tid 140411699963648] [client 212.119.47.95:20431] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:58.437904 2026] [access_compat:error] [pid 11972:tid 140411674785536] [client 170.168.96.198:36041] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:40:01.983812 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 170.168.99.154:62895] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:41:29.027010 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.228.16:37054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfQSZqj1wV0Si-OkefIogAAAAk"]
[Mon Mar 16 06:42:32.277113 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:53718] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfQiNSswJuvopo3lOhASQAAAIE"]
[Mon Mar 16 06:46:30.715334 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.228.16:39402] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfRdpqj1wV0Si-OkefI9AAAAAY"]
[Mon Mar 16 06:47:57.971695 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:34614] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfRzXjZBu2q05ozVU80egAAAVg"]
[Mon Mar 16 06:51:47.594265 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.228.16:39038] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfSs5qj1wV0Si-OkefJFwAAABc"]
[Mon Mar 16 06:53:10.025465 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:56252] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfTBtSswJuvopo3lOhA7QAAAJY"]
[Mon Mar 16 06:57:00.018080 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:33606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfT69SswJuvopo3lOhBDQAAAJI"]
[Mon Mar 16 06:58:34.791282 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:37818] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfUStSswJuvopo3lOhBGAAAAJY"]
[Mon Mar 16 07:02:22.122230 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:42780] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfVLo6lpbStxTqkSktMnAAAAlM"]
[Mon Mar 16 07:03:44.550312 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.244.31:57348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfVgHjZBu2q05ozVU81egAAAVI"]
[Mon Mar 16 07:09:28.224845 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.244.31:39774] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfW2P9ocpUE4ed4uDzPLQAAAgI"]
[Mon Mar 16 07:17:55.569845 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.228.16:56704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfY09SswJuvopo3lOhBkgAAAIo"]
[Mon Mar 16 07:20:25.251022 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.244.31:38644] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfZaQlT9VtDQc7bgUyHmwAAAQM"]
[Mon Mar 16 07:23:15.910716 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.228.16:57958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfaE3jZBu2q05ozVU82VAAAAUk"]
[Mon Mar 16 07:25:46.862180 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.244.31:58474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfaqglT9VtDQc7bgUyH1QAAAQI"]
[Mon Mar 16 07:28:20.122476 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:57828] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfbRHbQATo66fKoS7wr6QAAAMw"]
[Mon Mar 16 07:30:51.535345 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.244.31:51102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfb25qj1wV0Si-OkefKlAAAABM"]
[Mon Mar 16 07:33:47.382962 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.228.16:60074] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfci46lpbStxTqkSktOzAAAAk4"]
[Mon Mar 16 07:36:16.191116 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.244.31:59954] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfdIHbQATo66fKoS7wsIQAAAM8"]
[Mon Mar 16 07:38:55.279867 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.228.16:46834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfdv_9ocpUE4ed4uDzQvwAAAg4"]
[Mon Mar 16 07:44:18.156698 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.228.16:51998] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abffABXjF1vJNtV6CWrclAAAAcU"]
[Mon Mar 16 07:46:44.823678 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:52532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfflLABkC4fWIHEf8HNiAAAAEs"]
[Mon Mar 16 07:49:26.550772 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.228.16:44452] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfgNrysWC90G-1nBrAoIQAAAYw"]
[Mon Mar 16 07:51:47.140802 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.244.31:44808] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfgw_9ocpUE4ed4uDzRFQAAAgM"]
[Mon Mar 16 07:54:48.855715 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:41708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfheLABkC4fWIHEf8HOQAAAAFE"]
[Mon Mar 16 07:57:15.905164 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.244.31:59830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfiC5qj1wV0Si-OkefL1wAAAAY"]
[Mon Mar 16 07:59:55.813187 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:49834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfiq3bQATo66fKoS7wtMQAAAMQ"]
[Mon Mar 16 08:00:50.641093 2026] [access_compat:error] [pid 10772:tid 140411599251200] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php-info.php
[Mon Mar 16 08:00:50.858902 2026] [access_compat:error] [pid 10772:tid 140411725141760] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/newinfo.php
[Mon Mar 16 08:00:51.061355 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/siteinfo.php
[Mon Mar 16 08:00:51.447033 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php-info.php
[Mon Mar 16 08:00:51.638976 2026] [access_compat:error] [pid 21805:tid 140411699963648] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/newinfo.php
[Mon Mar 16 08:00:51.842705 2026] [access_compat:error] [pid 21805:tid 140411616036608] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/siteinfo.php
[Mon Mar 16 08:00:55.247930 2026] [access_compat:error] [pid 11972:tid 140411548894976] [client 185.177.72.13:38002] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pageinfo.php
[Mon Mar 16 08:00:55.891914 2026] [access_compat:error] [pid 10772:tid 140411565680384] [client 185.177.72.13:38016] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pageinfo.php
[Mon Mar 16 08:00:59.362378 2026] [access_compat:error] [pid 21533:tid 140411716749056] [client 185.177.72.13:38040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/release_info.php
[Mon Mar 16 08:01:00.054618 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfi7NSswJuvopo3lOhDvQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:01:00.390066 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 185.177.72.13:38044] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/release_info.php
[Mon Mar 16 08:01:03.776639 2026] [access_compat:error] [pid 21805:tid 140411607643904] [client 185.177.72.13:28898] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 08:01:05.223595 2026] [access_compat:error] [pid 10709:tid 140411674785536] [client 185.177.72.13:28908] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 08:01:13.010262 2026] [access_compat:error] [pid 21946:tid 140411641214720] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_info.php
[Mon Mar 16 08:01:13.211973 2026] [access_compat:error] [pid 21946:tid 140411674785536] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_phpinfo.php
[Mon Mar 16 08:01:13.396117 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_info.php
[Mon Mar 16 08:01:13.414648 2026] [access_compat:error] [pid 21946:tid 140411733534464] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dbinfo.php
[Mon Mar 16 08:01:13.596901 2026] [access_compat:error] [pid 11972:tid 140411674785536] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_phpinfo.php
[Mon Mar 16 08:01:13.621800 2026] [access_compat:error] [pid 21946:tid 140411557287680] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_info.php
[Mon Mar 16 08:01:13.804629 2026] [access_compat:error] [pid 11972:tid 140411733534464] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dbinfo.php
[Mon Mar 16 08:01:14.009891 2026] [access_compat:error] [pid 11972:tid 140411725141760] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_info.php
[Mon Mar 16 08:01:15.783809 2026] [access_compat:error] [pid 21946:tid 140411548894976] [client 185.177.72.13:47156] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Mon Mar 16 08:01:15.991215 2026] [access_compat:error] [pid 21946:tid 140411574073088] [client 185.177.72.13:47156] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 08:01:16.099972 2026] [access_compat:error] [pid 21946:tid 140411708356352] [client 185.177.72.13:47160] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Mon Mar 16 08:01:16.310810 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 185.177.72.13:47160] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 08:01:19.949637 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 185.177.72.13:47190] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pinfo.php
[Mon Mar 16 08:01:20.644941 2026] [access_compat:error] [pid 10709:tid 140411590858496] [client 185.177.72.13:47204] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pinfo.php
[Mon Mar 16 08:02:04.019666 2026] [access_compat:error] [pid 10709:tid 140411632822016] [client 185.177.72.13:2632] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 08:02:04.994535 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 185.177.72.13:2638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 08:02:21.976777 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:44894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfjPbABkC4fWIHEf8HOnQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:02:23.286886 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:34930] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfjP7ABkC4fWIHEf8HOoQAAAEI"]
[Mon Mar 16 08:03:13.006619 2026] [access_compat:error] [pid 10831:tid 140411624429312] [client 185.177.72.13:40586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.sample.php
[Mon Mar 16 08:03:13.034181 2026] [access_compat:error] [pid 32654:tid 140411624429312] [client 185.177.72.13:40598] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.sample.php
[Mon Mar 16 08:03:22.506250 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 185.177.72.13:9604] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Mon Mar 16 08:03:22.560567 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 185.177.72.13:9608] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Mon Mar 16 08:04:16.683891 2026] [access_compat:error] [pid 10651:tid 140411733534464] [client 185.177.72.13:15954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 08:04:16.886162 2026] [access_compat:error] [pid 10651:tid 140411574073088] [client 185.177.72.13:15954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Mon Mar 16 08:04:17.018499 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 185.177.72.13:15956] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 08:04:17.211309 2026] [access_compat:error] [pid 21533:tid 140411599251200] [client 185.177.72.13:15956] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Mon Mar 16 08:05:00.190662 2026] [access_compat:error] [pid 11972:tid 140411691570944] [client 185.177.72.13:31106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 08:05:00.297991 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.228.16:34256] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfj3LysWC90G-1nBrApGQAAAY8"]
[Mon Mar 16 08:05:00.340681 2026] [access_compat:error] [pid 32654:tid 140411649607424] [client 185.177.72.13:31122] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 08:06:07.719316 2026] [access_compat:error] [pid 21533:tid 140411590858496] [client 185.177.72.13:44630] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Mon Mar 16 08:06:07.893573 2026] [access_compat:error] [pid 10709:tid 140411574073088] [client 185.177.72.13:44636] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Mon Mar 16 08:07:23.788178 2026] [access_compat:error] [pid 10651:tid 140411666392832] [client 185.177.72.13:53678] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pi.php
[Mon Mar 16 08:07:23.838606 2026] [access_compat:error] [pid 11972:tid 140411716749056] [client 185.177.72.13:53680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pi.php
[Mon Mar 16 08:07:26.132100 2026] [access_compat:error] [pid 10651:tid 140411616036608] [client 185.177.72.13:53684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 08:07:26.133335 2026] [access_compat:error] [pid 32654:tid 140411666392832] [client 185.177.72.13:53688] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 08:07:49.340762 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:55186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfkhbABkC4fWIHEf8HPIwAAAFU"]
[Mon Mar 16 08:08:28.790567 2026] [access_compat:error] [pid 10651:tid 140411674785536] [client 185.177.72.13:24456] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env_copy
[Mon Mar 16 08:08:28.846186 2026] [access_compat:error] [pid 32654:tid 140411658000128] [client 185.177.72.13:24466] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env_copy
[Mon Mar 16 08:10:00.150767 2026] [authz_core:error] [pid 21805:tid 140411725141760] [client 185.177.72.13:38136] AH01630: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess
[Mon Mar 16 08:10:00.367542 2026] [authz_core:error] [pid 21806:tid 140411632822016] [client 185.177.72.13:38148] AH01630: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess
[Mon Mar 16 08:10:45.396948 2026] [access_compat:error] [pid 21806:tid 140411658000128] [client 185.177.72.13:13866] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/123.php
[Mon Mar 16 08:10:48.356970 2026] [access_compat:error] [pid 21805:tid 140411666392832] [client 185.177.72.13:13876] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/123.php
[Mon Mar 16 08:11:33.898018 2026] [access_compat:error] [pid 21946:tid 140411624429312] [client 185.177.72.13:11040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a.php
[Mon Mar 16 08:11:35.835618 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 185.177.72.13:11048] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a.php
[Mon Mar 16 08:12:06.154573 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 185.177.72.13:24890] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adminer.php
[Mon Mar 16 08:12:17.666745 2026] [access_compat:error] [pid 21946:tid 140411691570944] [client 185.177.72.13:57352] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/apache.php
[Mon Mar 16 08:12:37.617849 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:49162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflpbysWC90G-1nBrApiwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:12:38.940350 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:58738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflphXjF1vJNtV6CWreegAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:12:40.783608 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:57262] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqHbQATo66fKoS7wuGQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:42.115345 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:51532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqtSswJuvopo3lOhEuQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:43.281763 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:51540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqxXjF1vJNtV6CWrefQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:45.674614 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:51552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflrbysWC90G-1nBrAplAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:49.030378 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:51560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflsXbQATo66fKoS7wuHQAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:50.243227 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.244.31:42470] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abflsv9ocpUE4ed4uDzScgAAAhI"]
[Mon Mar 16 08:12:51.339106 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:46104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfls7ysWC90G-1nBrApmgAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:59.689240 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflu_9ocpUE4ed4uDzSegAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:13:56.388491 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:46112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9HjZBu2q05ozVU840wAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:13:57.693592 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9XbQATo66fKoS7wuIwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:13:58.894488 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:51590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9rABkC4fWIHEf8HPZgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:00.191931 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:51596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-Jqj1wV0Si-OkefNBQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:01.375337 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:51608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-Zqj1wV0Si-OkefNBgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:02.555032 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:51618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-o6lpbStxTqkSktRYAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:03.845218 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:51622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-_9ocpUE4ed4uDzSgQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:07.045031 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:51626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl_xXjF1vJNtV6CWreiAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:08.320716 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:58298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmANSswJuvopo3lOhEwAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:08.827629 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:36348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAAlT9VtDQc7bgUyLpQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:09.472546 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:58306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAXjZBu2q05ozVU841AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:10.819846 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:58322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAo6lpbStxTqkSktRZAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:11.129908 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:59082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmA46lpbStxTqkSktRZQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:12.141018 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:58336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBHbQATo66fKoS7wuJgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:12.458487 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:33728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBLysWC90G-1nBrAp4gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:13.462739 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:58344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBQlT9VtDQc7bgUyLpgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:14.756744 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:58358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBhXjF1vJNtV6CWreiQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:14.794963 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:33738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBglT9VtDQc7bgUyLqAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:16.047061 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:58370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCP9ocpUE4ed4uDzSggAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:17.151648 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCRXjF1vJNtV6CWrejAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:18.325009 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:58374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCv9ocpUE4ed4uDzShAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:18.462898 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCv9ocpUE4ed4uDzShQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:19.587474 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:57674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmC9SswJuvopo3lOhEwQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:19.676977 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:33766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmC3jZBu2q05ozVU842AAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:20.878549 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:57676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDHjZBu2q05ozVU842QAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:22.015826 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:57682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDhXjF1vJNtV6CWrejQAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:22.060471 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:46122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDnjZBu2q05ozVU842wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:23.280472 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:57692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmD3bQATo66fKoS7wuKAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:23.342966 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmD5qj1wV0Si-OkefNCQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:24.577636 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:57696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEJqj1wV0Si-OkefNCgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:25.588770 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:46138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEZqj1wV0Si-OkefNDAAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:25.914185 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEbABkC4fWIHEf8HPaQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:27.219701 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:57720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmE7ABkC4fWIHEf8HPagAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:27.909655 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:46146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmE5qj1wV0Si-OkefNDgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:28.453122 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:52058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFP9ocpUE4ed4uDzShwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:29.102996 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:52062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFRXjF1vJNtV6CWrekAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:30.255654 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:46154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFrABkC4fWIHEf8HPbAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:30.711319 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:52076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFo6lpbStxTqkSktRaAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:32.226392 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:52086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGHbQATo66fKoS7wuLAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:32.623018 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:38200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGHbQATo66fKoS7wuLQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:33.810781 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:52094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGXjZBu2q05ozVU843QAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:34.992030 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:38208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGnbQATo66fKoS7wuLwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:35.284950 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:52104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmG_9ocpUE4ed4uDzSiQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:36.315589 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:38216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHP9ocpUE4ed4uDzSigAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:36.867407 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:52120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHBXjF1vJNtV6CWrelQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:37.593683 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:38220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHRXjF1vJNtV6CWrelgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:38.782573 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:38228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHo6lpbStxTqkSktRaQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:39.980000 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:54772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmH3jZBu2q05ozVU844AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:41.584238 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:38240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIQlT9VtDQc7bgUyLqwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:42.887099 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:33838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIv9ocpUE4ed4uDzSjAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:42.988842 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:54784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIhXjF1vJNtV6CWremgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:45.235736 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJZqj1wV0Si-OkefNEQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:46.531713 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:33858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJpqj1wV0Si-OkefNEwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:46.952044 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJv9ocpUE4ed4uDzSjwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:48.371376 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:59530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKLABkC4fWIHEf8HPbwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:48.847546 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:33868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKAlT9VtDQc7bgUyLrQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:49.689153 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:59534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKXjZBu2q05ozVU845wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:50.206332 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:39044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKnjZBu2q05ozVU846QAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:52.037899 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:59548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLNSswJuvopo3lOhEygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:52.541579 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:39060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLHbQATo66fKoS7wuNAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:53.794702 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:39064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLbABkC4fWIHEf8HPcQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:54.973263 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLrysWC90G-1nBrAp_QAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:56.108799 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:39082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmMAlT9VtDQc7bgUyLrgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:58.383491 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:39084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmMnbQATo66fKoS7wuOAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:01.415064 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:39100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNLABkC4fWIHEf8HPcwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:02.675397 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:59552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNnjZBu2q05ozVU84_QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:02.871890 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:57064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNglT9VtDQc7bgUyLrwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:03.963821 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:54902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmN9SswJuvopo3lOhEywAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:05.226196 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:54904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmOY6lpbStxTqkSktRbQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:06.363476 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:57072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmOv9ocpUE4ed4uDzSlAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:07.683466 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:54908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmO46lpbStxTqkSktRcAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:09.721052 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:57082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPQlT9VtDQc7bgUyLtAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:11.034982 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:40690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPwlT9VtDQc7bgUyLtgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:11.087255 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:53820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPwlT9VtDQc7bgUyLtwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:12.167383 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:40704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQBXjF1vJNtV6CWrenwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:12.387756 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:53836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQLABkC4fWIHEf8HPdAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:14.498878 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:40708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQhXjF1vJNtV6CWreoQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:16.648129 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:53848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmRAlT9VtDQc7bgUyLvQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:19.876176 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:53864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmR3bQATo66fKoS7wuOwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:21.221878 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.241.46:48434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmSQlT9VtDQc7bgUyLvgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:27.818065 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:48446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmTxXjF1vJNtV6CWreqAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:29.110925 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:48898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmUQlT9VtDQc7bgUyLwAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:30.283358 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmUrABkC4fWIHEf8HPdQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:31.575544 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:48908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmU9SswJuvopo3lOhEzwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:34.667244 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:40716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmVrysWC90G-1nBrAqEAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:36.886773 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:48912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWAlT9VtDQc7bgUyLxwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:37.048840 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:53608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWRXjF1vJNtV6CWreqwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:38.232460 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:53222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWrABkC4fWIHEf8HPdgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:40.466544 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:53228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmXHbQATo66fKoS7wuPQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:41.756117 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:53242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmXbysWC90G-1nBrAqEQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:45.641241 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmYbysWC90G-1nBrAqFAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:46.964746 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:53254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmYpqj1wV0Si-OkefNGwAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:54.720241 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:36500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmapqj1wV0Si-OkefNJAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:56.046988 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:36512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbNSswJuvopo3lOhE0wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:57.576459 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:36518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbf9ocpUE4ed4uDzSlwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:58.806989 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:48360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbo6lpbStxTqkSktReAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:00.063997 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:48372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcI6lpbStxTqkSktReQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:01.364223 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:48376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcY6lpbStxTqkSktRegAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:02.715179 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:48390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcnjZBu2q05ozVU85MQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:03.982885 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:48402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmc7ysWC90G-1nBrAqFQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:06.159659 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.241.46:48406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmdglT9VtDQc7bgUyLywAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:10.889165 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:48412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmev9ocpUE4ed4uDzSnAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:12.206592 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmfLABkC4fWIHEf8HPmwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:15.813836 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:34954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmfwlT9VtDQc7bgUyLzgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:17.155240 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:34958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgRXjF1vJNtV6CWrerQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:18.271280 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgrABkC4fWIHEf8HPoQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:18.583006 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:54082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgrABkC4fWIHEf8HPogAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:19.776166 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:54092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmg5qj1wV0Si-OkefNKAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:21.133892 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhf9ocpUE4ed4uDzSnQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:22.207585 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:36610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhpqj1wV0Si-OkefNKwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:22.506670 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:54108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmho6lpbStxTqkSktRfQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:23.459949 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:35576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmh_9ocpUE4ed4uDzSnwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:23.720848 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:54122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhxXjF1vJNtV6CWrergAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:24.992574 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:54124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiHbQATo66fKoS7wuQgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:25.918993 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:35588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiQlT9VtDQc7bgUyL0wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:26.371057 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:54126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiglT9VtDQc7bgUyL1AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:27.578113 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:54132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmi7ABkC4fWIHEf8HPowAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:32.683757 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:35592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmkAlT9VtDQc7bgUyL3QAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:35.835655 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:40024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmkwlT9VtDQc7bgUyL4AAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:36.183925 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:44656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlHjZBu2q05ozVU85TQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:37.152342 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:40026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlZqj1wV0Si-OkefNLAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:38.503931 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:50202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlnbQATo66fKoS7wuRQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:39.666500 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:44668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfml3bQATo66fKoS7wuRwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:40.890950 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:50216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmmBXjF1vJNtV6CWresAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:43.268525 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:50226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmm46lpbStxTqkSktRfwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:43.373345 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:44814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmm3bQATo66fKoS7wuSgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:44.672232 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:44822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmnP9ocpUE4ed4uDzSoQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:46.911351 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:50228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmnv9ocpUE4ed4uDzSpAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:50.336679 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:44838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmotSswJuvopo3lOhE2wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:51.335198 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:33730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmo7ysWC90G-1nBrAqGwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:53.735856 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:33736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmpXjZBu2q05ozVU85XAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:54.832301 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmprABkC4fWIHEf8HPrAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:57.270371 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:52234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqZqj1wV0Si-OkefNLwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:58.151622 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:33744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqo6lpbStxTqkSktRhAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:58.626391 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqhXjF1vJNtV6CWreswAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:59.462848 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:57790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmq9SswJuvopo3lOhE3AAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:00.823187 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:57792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmrNSswJuvopo3lOhE3gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:04.334239 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:57798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmsJqj1wV0Si-OkefNMwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:05.613808 2026] [mime_magic:error] [pid 21805:tid 140411632822016] (70014)End of file found: [client 74.7.241.46:57808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/fs
[Mon Mar 16 08:17:06.135420 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:52252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmstSswJuvopo3lOhE5AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:08.555944 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:36538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmtLysWC90G-1nBrAqHgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:10.917844 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:36544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmtrysWC90G-1nBrAqIAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:12.395953 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:57816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmuAlT9VtDQc7bgUyL6AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:16.453217 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:45738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmvLABkC4fWIHEf8HPxAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:20.077616 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmv5qj1wV0Si-OkefNOgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:22.483025 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:58132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmwo6lpbStxTqkSktRhwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:24.810497 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:58142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmxP9ocpUE4ed4uDzSqQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:26.179674 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:58144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmxhXjF1vJNtV6CWretgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:27.459161 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:58154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmx9SswJuvopo3lOhE6AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:31.939076 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:45742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmy7ysWC90G-1nBrAqLgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:33.211975 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:38538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmzf9ocpUE4ed4uDzSqgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:37.738923 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:38544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm0Y6lpbStxTqkSktRjQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:39.063247 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:38550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm046lpbStxTqkSktRjgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:40.403977 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:35210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm1Jqj1wV0Si-OkefNSQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:41.764347 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:40288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm1dSswJuvopo3lOhE6gAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:43.362554 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:48548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm13bQATo66fKoS7wuVQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:44.167911 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:40302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2AlT9VtDQc7bgUyL8AAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:45.450086 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:40304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2Zqj1wV0Si-OkefNSgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:45.800016 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2XjZBu2q05ozVU85YwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:48.115597 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:48560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3P9ocpUE4ed4uDzSrwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:49.060348 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:40314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3f9ocpUE4ed4uDzSsQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:51.603471 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:48570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3xXjF1vJNtV6CWrevQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:52.930501 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:50612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm4Jqj1wV0Si-OkefNSwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:54.231780 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:50616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm4tSswJuvopo3lOhE7AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:55.119735 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:37934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm43jZBu2q05ozVU85aAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:55.537449 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm47ABkC4fWIHEf8HP5QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:55.787097 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm47ABkC4fWIHEf8HP5gAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:57.476220 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:37948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm5QlT9VtDQc7bgUyL8gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:58.739085 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:36080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm5rysWC90G-1nBrAqMAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:00.871808 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:36092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm6HbQATo66fKoS7wuWAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:11.055793 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:50628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm8_9ocpUE4ed4uDzSvwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:12.377148 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm9I6lpbStxTqkSktRkwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:14.671735 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:54816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm9pqj1wV0Si-OkefNTwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:15.113040 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:36106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm93bQATo66fKoS7wuZgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:15.954265 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:54820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm99SswJuvopo3lOhE7gAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:20.527621 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm_NSswJuvopo3lOhE8gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:20.704914 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:59476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm_AlT9VtDQc7bgUyL_AAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:25.065221 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:48008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnAbysWC90G-1nBrAqNgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:26.400095 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:48024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnAnbQATo66fKoS7wuZwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:27.602443 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:48030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnA46lpbStxTqkSktRlwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:28.750039 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:42864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnBHbQATo66fKoS7wuaAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:33.204346 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:42868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnCdSswJuvopo3lOhE9gAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:33.393823 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:58812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnCRXjF1vJNtV6CWrezQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:35.586833 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnC5qj1wV0Si-OkefNUgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:35.672288 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:47916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnC7ysWC90G-1nBrAqOAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:37.013284 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:47928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnDdSswJuvopo3lOhE-AAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:41.559111 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:47936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnEY6lpbStxTqkSktRnAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:43.347003 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:42892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnExXjF1vJNtV6CWre2QAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:43.954411 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:50166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnExXjF1vJNtV6CWre2gAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:49.451494 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:50182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnGQlT9VtDQc7bgUyMAwAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:51.191402 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:50370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnG9SswJuvopo3lOhFAQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:54.515272 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:40098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnHpqj1wV0Si-OkefNXQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:01.613594 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:40108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnJQlT9VtDQc7bgUyMCgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:08.483723 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:49970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnLAlT9VtDQc7bgUyMDgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:09.577883 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:44114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnLZqj1wV0Si-OkefNbQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:22.183231 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:49972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnOglT9VtDQc7bgUyMKQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:30.057431 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:53386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnQglT9VtDQc7bgUyMMgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:34.295704 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:42858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnRv9ocpUE4ed4uDzS0wAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:37.491614 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:48026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnSY6lpbStxTqkSktRqgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:38.884705 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:39364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnSrysWC90G-1nBrAqSQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:40.275628 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:39376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnTBXjF1vJNtV6CWre5gAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:48.257984 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:39448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVJqj1wV0Si-OkefNgQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:48.340211 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:39384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVHbQATo66fKoS7wufAAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:50.686533 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVhXjF1vJNtV6CWre7AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:51.814530 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:52392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnV9SswJuvopo3lOhFDgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:53.181044 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:52398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnWXjZBu2q05ozVU85ngAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:54.567160 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:52400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnWtSswJuvopo3lOhFDwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:59.042765 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:52416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnXwlT9VtDQc7bgUyMOwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:04.423017 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:42892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnZJqj1wV0Si-OkefNhgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:05.715667 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:42898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnZZqj1wV0Si-OkefNhwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:08.615470 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnaHbQATo66fKoS7wumAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:09.919226 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:59976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnaXjZBu2q05ozVU85tAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:13.781616 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.228.16:41072] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfnbXjZBu2q05ozVU85wAAAAVY"]
[Mon Mar 16 08:20:17.721445 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:42906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfncXjZBu2q05ozVU85ywAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:22.436902 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:35654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfndpqj1wV0Si-OkefNjAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:28.410575 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:35664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnfLysWC90G-1nBrAqXQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:31.809652 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:39582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnf3jZBu2q05ozVU854gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:33.093787 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:51676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfngRXjF1vJNtV6CWre7gAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:45.387404 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:39542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnjQlT9VtDQc7bgUyMXAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:48.462687 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:39092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnkJqj1wV0Si-OkefNkAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:50.815582 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:33898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnktSswJuvopo3lOhFFAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:55.348721 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:33908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnl_9ocpUE4ed4uDzS4QAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:57.664690 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:33920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnmdSswJuvopo3lOhFFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:58.920410 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:55588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnmpqj1wV0Si-OkefNlAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:00.176491 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:51686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnnAlT9VtDQc7bgUyMawAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:03.755652 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:55600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnn3bQATo66fKoS7wuoQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:05.124116 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:55608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnoY6lpbStxTqkSktRtAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:10.790335 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:55620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnpv9ocpUE4ed4uDzS5wAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:12.839126 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:54022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnqAlT9VtDQc7bgUyMeQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:16.432282 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnrBXjF1vJNtV6CWre9AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:21.952018 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:36810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnsXbQATo66fKoS7wusgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:26.581414 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:43424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfntnbQATo66fKoS7wuvAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:27.865081 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:49030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnt3bQATo66fKoS7wuvgAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:27.891328 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:43434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnt_9ocpUE4ed4uDzS6gAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:29.200984 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:33392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnuXbQATo66fKoS7wuvwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:32.474626 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:43442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnvBXjF1vJNtV6CWre-QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:35.915883 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:60332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnv5qj1wV0Si-OkefNmwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:37.182702 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:60348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnwRXjF1vJNtV6CWre-gAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:38.549596 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:60360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnwo6lpbStxTqkSktRuQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:42.203765 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:60366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnxglT9VtDQc7bgUyMfAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:45.215501 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:33404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnyf9ocpUE4ed4uDzS-gAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:46.515120 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:44102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnyo6lpbStxTqkSktRugAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:49.060695 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:37702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnzXbQATo66fKoS7wuygAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:50.223454 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:38594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnzhXjF1vJNtV6CWre_gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:54.666738 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn0njZBu2q05ozVU86EAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:57.018178 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:53708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn1bysWC90G-1nBrAqZwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:57.924950 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:38600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn1QlT9VtDQc7bgUyMgwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:21:59.232229 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:45296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn146lpbStxTqkSktRvAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:03.905453 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:53716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn27ysWC90G-1nBrAqbQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:05.153073 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:54008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn3bysWC90G-1nBrAqcAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:05.633197 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:45308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn3dSswJuvopo3lOhFJAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:07.968275 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:45316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn37ysWC90G-1nBrAqdQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:09.023796 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:54016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn4bysWC90G-1nBrAqdgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:22:10.399327 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:56908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn4hXjF1vJNtV6CWrfAQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:11.775431 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:56916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn45qj1wV0Si-OkefNnQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:17.464263 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:36896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn6dSswJuvopo3lOhFLQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:20.681557 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:56924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn7Jqj1wV0Si-OkefNpAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:28.256057 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:58358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn9I6lpbStxTqkSktRxwAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:29.981991 2026] [mime_magic:error] [pid 21533:tid 140411641214720] (70014)End of file found: [client 74.7.243.203:36900] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/cache/man
[Mon Mar 16 08:22:30.648862 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:44322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn9pqj1wV0Si-OkefNpgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:34.086575 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn-o6lpbStxTqkSktRywAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:50.940708 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.244.31:52726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfoCo6lpbStxTqkSktRzAAAAkc"]
[Mon Mar 16 08:22:53.183444 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:44334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoDRXjF1vJNtV6CWrfUwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:55.398955 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoDQlT9VtDQc7bgUyMqgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:22:56.400473 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:57052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoEHjZBu2q05ozVU86IQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:58.807580 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:57068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoEo6lpbStxTqkSktRzgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:00.133265 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:59178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFAlT9VtDQc7bgUyMqwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:01.441885 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:59192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFQlT9VtDQc7bgUyMrAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:02.723692 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:59200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFglT9VtDQc7bgUyMrwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:04.062750 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:59206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoGHjZBu2q05ozVU86IgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:08.607326 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:59222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoHI6lpbStxTqkSktR0gAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:09.927212 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:50982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoHZqj1wV0Si-OkefNqAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:11.837233 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:35536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoH7ABkC4fWIHEf8HQtgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:12.242912 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:50994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoII6lpbStxTqkSktR1wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:15.223520 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:50996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoI9SswJuvopo3lOhFMQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:16.608965 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:51004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoJBXjF1vJNtV6CWrfVAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:17.932680 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:51012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoJRXjF1vJNtV6CWrfVQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:21.104162 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:45822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKdSswJuvopo3lOhFNwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:21.199466 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:57708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKRXjF1vJNtV6CWrfWAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:22.511142 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.241.46:57724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKnbQATo66fKoS7wu0gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:23.802977 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:57736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoK46lpbStxTqkSktR2AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:26.167544 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:57752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoLglT9VtDQc7bgUyMugAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:26.711440 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:34996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoLglT9VtDQc7bgUyMvAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:27.524917 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:57764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoL3jZBu2q05ozVU86JQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:32.121353 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:53106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoNAlT9VtDQc7bgUyMxAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:41.643087 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:35002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoPbABkC4fWIHEf8HQ0gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:56.725326 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:55348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoTLABkC4fWIHEf8HQ4AAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:10.980872 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:53122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoWnbQATo66fKoS7wvCAAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:24:17.039464 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:52302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoYXbQATo66fKoS7wvFQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:18.350471 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:34420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoYglT9VtDQc7bgUyM5gAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:35.087550 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:34426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfocxXjF1vJNtV6CWrfbQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:36.401516 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:43526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfodHjZBu2q05ozVU86KwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:37.790479 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:43542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfodY6lpbStxTqkSktR3gAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:53.466857 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:43550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfohbysWC90G-1nBrAqlwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:54.735473 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfohglT9VtDQc7bgUyNAwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:56.047373 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:32862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoiAlT9VtDQc7bgUyNBQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:57.368308 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:32870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoiY6lpbStxTqkSktR4gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:10.189437 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:44778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfolnbQATo66fKoS7wvSAAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:25:11.501371 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:46674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfolwlT9VtDQc7bgUyNEwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:13.710320 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:46686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfomY6lpbStxTqkSktR8wAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:14.221087 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:45146] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfomrABkC4fWIHEf8HQ6AAAAEg"]
[Mon Mar 16 08:25:16.328599 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:46700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfonJqj1wV0Si-OkefNtAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:22.151214 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:32880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfooo6lpbStxTqkSktR_AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:24.557794 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:48456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfopP9ocpUE4ed4uDzTKQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:25.890321 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:48468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfopQlT9VtDQc7bgUyNIgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:27.258432 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:48480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfop46lpbStxTqkSktR_gAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:28.552790 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoqLysWC90G-1nBrAqmQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:29.845550 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:48498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoqXbQATo66fKoS7wvSQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:31.180072 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:59994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoq9SswJuvopo3lOhFQQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:32.326541 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:60004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforHjZBu2q05ozVU86NQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:34.622700 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:46706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforf9ocpUE4ed4uDzTMQAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:25:35.936104 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.241.46:46342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforxXjF1vJNtV6CWrfcgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:37.238663 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:46344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfosbABkC4fWIHEf8HQ7AAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:38.533518 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:51924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfospqj1wV0Si-OkefNuQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:38.847380 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:60018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfosnbQATo66fKoS7wvUAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:40.168957 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:34482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfotHjZBu2q05ozVU86OQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:41.488988 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfotZqj1wV0Si-OkefNugAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:44.875417 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:34506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfouLysWC90G-1nBrAqoQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:46.188468 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:34512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfounjZBu2q05ozVU86OgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:47.564795 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfou3jZBu2q05ozVU86OwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:50.039337 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:34522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfovo6lpbStxTqkSktSAQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:51.369155 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:43468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfovxXjF1vJNtV6CWrfdwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:53.819665 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:43476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfowXbQATo66fKoS7wvUwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:55.103292 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:43492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfow46lpbStxTqkSktSAgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:58.446569 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:43506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoxglT9VtDQc7bgUyNMwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:59.812043 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:43514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfox9SswJuvopo3lOhFVwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:01.358386 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:39408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoybysWC90G-1nBrAqrgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:02.660520 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:39416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoyo6lpbStxTqkSktSCQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:03.858734 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:51926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoy9SswJuvopo3lOhFWQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:03.952776 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:39424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoy3bQATo66fKoS7wvVAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:05.144431 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:39434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfozRXjF1vJNtV6CWrfewAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:05.194543 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:34686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfozRXjF1vJNtV6CWrffAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:06.370292 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:34690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoznjZBu2q05ozVU86PwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:07.464549 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:39436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoz5qj1wV0Si-OkefNwQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:08.785965 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:39442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo0AlT9VtDQc7bgUyNOQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:10.094971 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:39454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo0glT9VtDQc7bgUyNPQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:13.322407 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:56294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo1bysWC90G-1nBrAquwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:17.725865 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:56304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo2QlT9VtDQc7bgUyNSwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:22.581370 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:56312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo3pqj1wV0Si-OkefN0wAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:24.536321 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:52512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo33bQATo66fKoS7wvVwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:25.899168 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:52528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo4XbQATo66fKoS7wvWQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:27.793136 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:34692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo4wlT9VtDQc7bgUyNWAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:26:28.239177 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:52538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo5P9ocpUE4ed4uDzTNwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:29.590399 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo5bABkC4fWIHEf8HQ9AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:31.237053 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:34404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo546lpbStxTqkSktSDgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:31.908086 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:50016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo53jZBu2q05ozVU86QwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:34.243036 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:50024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo6hXjF1vJNtV6CWrfgAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:00.543089 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:34416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpBP9ocpUE4ed4uDzTUgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:03.883228 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:33618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpB46lpbStxTqkSktSLwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:08.357555 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:33624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpDI6lpbStxTqkSktSOQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:09.575063 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:57964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpDQlT9VtDQc7bgUyNYwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:18.643904 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:57966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpFglT9VtDQc7bgUyNawAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:20.980246 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:42940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpGI6lpbStxTqkSktSRgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:22.868629 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:50030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpGo6lpbStxTqkSktSSAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:27.595694 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.241.46:42946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpHxXjF1vJNtV6CWrfigAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:28.433601 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpILABkC4fWIHEf8HRBQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:30.787740 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpInjZBu2q05ozVU86UAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:34.557980 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:47410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpJglT9VtDQc7bgUyNcgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:35.851479 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:47426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpJ3jZBu2q05ozVU86UQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:41.349060 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:47434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpLXjZBu2q05ozVU86VgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:51.738173 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:45496] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfpN5qj1wV0Si-OkefN3AAAABA"]
[Mon Mar 16 08:28:06.099401 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:59878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpRrysWC90G-1nBrArLgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:16.377261 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:56550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpUJqj1wV0Si-OkefN4wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:26.531313 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:54588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpWhXjF1vJNtV6CWrfnAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:29.949243 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:37756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpXXbQATo66fKoS7wvbwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:31.252855 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:38834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpX_9ocpUE4ed4uDzTWwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:32.541864 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:38836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYLABkC4fWIHEf8HRCwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:33.362008 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:59372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYdSswJuvopo3lOhFqwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:28:33.803016 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:38844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYXbQATo66fKoS7wvcwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:37.831210 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpZXbQATo66fKoS7wvfAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:21.538789 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpkZqj1wV0Si-OkefOFAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:22.831932 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:44490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpknjZBu2q05ozVU86aAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:26.645417 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:35880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfplglT9VtDQc7bgUyNswAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:29.072055 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:43224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpmY6lpbStxTqkSktSWwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:33.655572 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:54092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpndSswJuvopo3lOhFswAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:34.997431 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:54102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpno6lpbStxTqkSktSZAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:37.164219 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpoXjZBu2q05ozVU86awAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:42.587477 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpprABkC4fWIHEf8HRGAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:43.915411 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:35780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpp3jZBu2q05ozVU86bQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:44.871502 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:44502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpqP9ocpUE4ed4uDzTdQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:54.686433 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:34834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpsnbQATo66fKoS7wvmgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:59.121309 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:38852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpt3jZBu2q05ozVU86cQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:03.855540 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:57160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpu3jZBu2q05ozVU86dQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:15.027835 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.228.16:38958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfpx46lpbStxTqkSktSkAAAAkg"]
[Mon Mar 16 08:30:17.927656 2026] [mime_magic:error] [pid 21946:tid 140411658000128] (70014)End of file found: [client 74.7.241.46:35786] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Mon Mar 16 08:30:27.916302 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:57176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp03bQATo66fKoS7wvzQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:32.542192 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:48002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp2AlT9VtDQc7bgUyNugAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:35.019482 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp2xXjF1vJNtV6CWrfuwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:35.063297 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:39998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp246lpbStxTqkSktSmAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:38.510983 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:37060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp3glT9VtDQc7bgUyNwwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:39.544275 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:40012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp3wlT9VtDQc7bgUyNxQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:43.319863 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:34562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp4XbQATo66fKoS7wv0QAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:45.494007 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:41478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp5XjZBu2q05ozVU86kAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:45.847055 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:34574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp5RXjF1vJNtV6CWrfwAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:50.197994 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:41492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp6rysWC90G-1nBrArnAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:51.613426 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:56944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp65qj1wV0Si-OkefOJgAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:58.419716 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:56946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp8rABkC4fWIHEf8HRLAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:00.874986 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:51944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp9LysWC90G-1nBrArngAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:11.947670 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:51956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp_3bQATo66fKoS7wv6gAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:41.381354 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqHdSswJuvopo3lOhF8QAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:31:46.266119 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:41450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqIo6lpbStxTqkSktSsgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:32:10.616081 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqOrysWC90G-1nBrAr2gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:14.119766 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:46698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqPhXjF1vJNtV6CWrf2wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:21.618920 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:46710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqRZqj1wV0Si-OkefOUwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:22.950955 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:43440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqRhXjF1vJNtV6CWrf3gAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:26.264102 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqSo6lpbStxTqkSktSvAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:31.195618 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:43458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqT_9ocpUE4ed4uDzTrAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:54.859598 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.244.31:34332] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfqZpqj1wV0Si-OkefOYQAAAAA"]
[Mon Mar 16 08:33:20.269076 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:41462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqgLABkC4fWIHEf8HRmAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:23.674548 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:52300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqg3bQATo66fKoS7wweAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:25.027021 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:52312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqhXbQATo66fKoS7wwewAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:33.936366 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqjbABkC4fWIHEf8HRoQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:37.021915 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:36136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqkQlT9VtDQc7bgUyOLwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:49.291372 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:36138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqnbABkC4fWIHEf8HRsQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:50.578853 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:55168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqno6lpbStxTqkSktS3gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:53.986592 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:55172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqobABkC4fWIHEf8HRtgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:34:19.386980 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:39630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqu3bQATo66fKoS7ww5wAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:20.711104 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:43078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqvJqj1wV0Si-OkefOcAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:22.950698 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:43088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqvnjZBu2q05ozVU87BgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:26.371081 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:43102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqwnjZBu2q05ozVU87CwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:47.967433 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:43114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq13jZBu2q05ozVU87JgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:49.299374 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:41774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq2dSswJuvopo3lOhGMgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:57.656871 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:41776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq4Zqj1wV0Si-OkefOjwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:35:19.980699 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.228.16:39694] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfq93jZBu2q05ozVU87KAAAAUc"]
[Mon Mar 16 08:35:25.522562 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:55174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq_RXjF1vJNtV6CWrgSgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:35:37.588366 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:47766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrCZqj1wV0Si-OkefOogAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:35:49.169691 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:58240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrFbysWC90G-1nBrAsOAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:36:00.171165 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:56150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrIHbQATo66fKoS7wxSQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:37:31.799187 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:57738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfre5qj1wV0Si-OkefPHwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:37:54.651339 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.244.31:39700] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfrkpqj1wV0Si-OkefPLgAAAAE"]
[Mon Mar 16 08:38:20.903294 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrrI6lpbStxTqkSktTMwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:35.263199 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:45982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfruxXjF1vJNtV6CWrgeAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:55.559249 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:40580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrz7ysWC90G-1nBrAsbgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:57.983561 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:33066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr0Zqj1wV0Si-OkefPfwAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:59.295460 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr05qj1wV0Si-OkefPggAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:39:40.101644 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:46574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr_AlT9VtDQc7bgUyPWgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:40:20.799381 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:57294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfsJHjZBu2q05ozVU87mgAAAVE"]
[Mon Mar 16 08:41:11.828623 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:58246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsV3jZBu2q05ozVU870wAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 08:41:30.023941 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsanbQATo66fKoS7wyAQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:41:32.377869 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:38092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsbLABkC4fWIHEf8HSegAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:42:45.339598 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:38098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfstbABkC4fWIHEf8HSyAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:42:45.415639 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:36884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfstY6lpbStxTqkSktUKAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:42:49.026906 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:43892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsuXbQATo66fKoS7wyGAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:43:24.013266 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:56236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfs3AlT9VtDQc7bgUyPwwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:04.539296 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:38580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftBP9ocpUE4ed4uDzU5QAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:18.622170 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:44242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftEo6lpbStxTqkSktUegAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:26.111500 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:35506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftGv9ocpUE4ed4uDzU-gAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:44:49.751415 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:55742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftMY6lpbStxTqkSktUmQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:54.311749 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:38756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftNrABkC4fWIHEf8HS-QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:44:55.651428 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:38762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftN_9ocpUE4ed4uDzVBQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:10.247528 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:38766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftRo6lpbStxTqkSktUpwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:45:21.075239 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.228.16:52534] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abftUZqj1wV0Si-OkefQOAAAAAA"]
[Mon Mar 16 08:45:42.630062 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:59390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftZdSswJuvopo3lOhG6gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:48.184023 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:51720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftbNSswJuvopo3lOhG7wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:59.237259 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:51730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftdwlT9VtDQc7bgUyQIQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:01.688971 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:59152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfteXbQATo66fKoS7wyYgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:35.562250 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:59160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftm_9ocpUE4ed4uDzVPAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:36.864484 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:40150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftnP9ocpUE4ed4uDzVPQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:02.305985 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:40158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftthXjF1vJNtV6CWrhMAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:06.576181 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:54044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftuo6lpbStxTqkSktVJgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:47:40.803038 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:44254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft3AlT9VtDQc7bgUyQYwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:47:53.251632 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:52446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft6XbQATo66fKoS7wymAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:57.154391 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.244.31:52598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abft7bABkC4fWIHEf8HTMAAAAEA"]
[Mon Mar 16 08:48:03.387335 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:37078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft8_9ocpUE4ed4uDzVWAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:05.872535 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:53418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft9Y6lpbStxTqkSktVLQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:08.295407 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft-LysWC90G-1nBrAtrQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:25.566631 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:35186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuCbABkC4fWIHEf8HTQwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:48:32.315519 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:47492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuEHbQATo66fKoS7wyqQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:38.721646 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:42018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuFnjZBu2q05ozVU88dQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:44.803099 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:51706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuHNSswJuvopo3lOhHyAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:54.967239 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:46902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuJglT9VtDQc7bgUyQnQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:28.115425 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:55804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuSAlT9VtDQc7bgUyQ0QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:49:37.279602 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:40760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuUXbQATo66fKoS7wy-gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:39.839232 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:46844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuUxXjF1vJNtV6CWrhXgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:53.747575 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:46154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuYY6lpbStxTqkSktVWwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:03.571182 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:46846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfua3jZBu2q05ozVU88ywAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:06.199829 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:32790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfubglT9VtDQc7bgUyQ6AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:07.311534 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:54088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfubwlT9VtDQc7bgUyQ6QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:08.616844 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:48642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfucAlT9VtDQc7bgUyQ7AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:09.973857 2026] [mime_magic:error] [pid 21533:tid 140411666392832] (70014)End of file found: [client 74.7.241.46:48648] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib
[Mon Mar 16 08:50:11.787113 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.241.46:48662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuc3bQATo66fKoS7wzCgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:14.768961 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:48666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfudpqj1wV0Si-OkefQhQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:16.386598 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:48676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfueHbQATo66fKoS7wzDwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:20.974887 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:48690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfufAlT9VtDQc7bgUyQ_AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:22.551158 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:51510] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfufnjZBu2q05ozVU884QAAAUw"]
[Mon Mar 16 08:50:29.326798 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:47806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuhLysWC90G-1nBrAt2wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:30.684374 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:34594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuho6lpbStxTqkSktVYAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:31.479638 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:46230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuh3bQATo66fKoS7wzGwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:31.849476 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:34596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuh3bQATo66fKoS7wzHAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:43.223404 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:34596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuk3bQATo66fKoS7wzKgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:19.435420 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:45696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfut_9ocpUE4ed4uDzVvwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:22.875417 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:55666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuuv9ocpUE4ed4uDzVwgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:25.415065 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuvdSswJuvopo3lOhIMwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:28.555041 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:55670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuwNSswJuvopo3lOhIPwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:52.396411 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2NSswJuvopo3lOhIYwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:52.488046 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:44588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2NSswJuvopo3lOhIZAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:51:54.787504 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:34928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2tSswJuvopo3lOhIaAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:59.485482 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:34934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu3xXjF1vJNtV6CWrhfwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:01.864520 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:57170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu4Zqj1wV0Si-OkefQugAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:04.627541 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:57176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu5P9ocpUE4ed4uDzVzQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:10.885980 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:35036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu6rysWC90G-1nBrAuEgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:14.303594 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:42394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu7hXjF1vJNtV6CWrhjAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:40.987585 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:42406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvCBXjF1vJNtV6CWrhpgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:51.011758 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvE_9ocpUE4ed4uDzV4gAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:57.485680 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:46032] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfvGQlT9VtDQc7bgUyRcAAAARQ"]
[Mon Mar 16 08:53:39.083579 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:50664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvQ3bQATo66fKoS7wzzAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:12.618297 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:50126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvZNSswJuvopo3lOhItgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:26.519434 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:59404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvco6lpbStxTqkSktV3QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:37.521662 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvfXjZBu2q05ozVU89VgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:55:21.215430 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:56968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvqXbQATo66fKoS7w0FAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:55:22.904156 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.228.16:34562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfvqglT9VtDQc7bgUyRzwAAAQw"]
[Mon Mar 16 08:56:07.139397 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:41386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv17ABkC4fWIHEf8HT3wAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:19.247613 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:57812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv4wlT9VtDQc7bgUySCgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:56:35.780278 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:35658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv846lpbStxTqkSktWvQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:38.555406 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv9glT9VtDQc7bgUySMwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:56:44.341549 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:58524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv_BXjF1vJNtV6CWrh8wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:45.680365 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:58530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv_bysWC90G-1nBrAuewAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:48.011050 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:58540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwALysWC90G-1nBrAugAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:02.461293 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:39370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwDo6lpbStxTqkSktWzwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:11.470289 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:44696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwF3jZBu2q05ozVU89tgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:57:50.083234 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:41454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwPrysWC90G-1nBrAuugAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:53.303245 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:53122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwQZqj1wV0Si-OkefRdAAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:55.682981 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:58102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwQ7ABkC4fWIHEf8HUAQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:57:57.520834 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.244.31:34292] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfwRbysWC90G-1nBrAuvQAAAY4"]
[Mon Mar 16 08:58:00.133027 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:58118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwSNSswJuvopo3lOhJEgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:04.949633 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:38724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwTAlT9VtDQc7bgUySmwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:07.911550 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:50666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwT9SswJuvopo3lOhJFAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:11.333148 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:38028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwUwlT9VtDQc7bgUySpwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:16.200869 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:57512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwWI6lpbStxTqkSktW7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:18.584100 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:57528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwWrABkC4fWIHEf8HUDQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:38.116082 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:50680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwbtSswJuvopo3lOhJNgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:42.746976 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:51550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwcglT9VtDQc7bgUySvAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:59:04.321149 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwiP9ocpUE4ed4uDzWWAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:59:27.838506 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:53320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwn46lpbStxTqkSktXOgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:00:23.806409 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.228.16:39478] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfw1wlT9VtDQc7bgUyS8QAAAQ0"]
[Mon Mar 16 09:00:27.858627 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:59402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw25qj1wV0Si-OkefSAwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:00:45.570738 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:37040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw7XjZBu2q05ozVU8-XAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:00:56.163080 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:42834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw-Jqj1wV0Si-OkefSGQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:02.641944 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:59874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw_nbQATo66fKoS7w0mwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:03.959664 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw__9ocpUE4ed4uDzWcQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:05.350745 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:58150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxAbABkC4fWIHEf8HUOwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:01:25.226045 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:42244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxFXjZBu2q05ozVU8-iQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:26.658340 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:50904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxFnjZBu2q05ozVU8-iwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:01:40.611751 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:50920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxJHjZBu2q05ozVU8-lwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:47.323921 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:52476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxK3jZBu2q05ozVU8-owAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:58.898256 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:53590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxNnbQATo66fKoS7w0wgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:02:57.545979 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:59156] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfxcdSswJuvopo3lOhJfwAAAIM"]
[Mon Mar 16 09:03:09.125009 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxfXbQATo66fKoS7w1HgAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:03:52.355766 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:60906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxqLABkC4fWIHEf8HUhQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:04:11.006405 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:39482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxu_9ocpUE4ed4uDzW1QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:04:57.819174 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:50118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfx6QlT9VtDQc7bgUyTkwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:05.667332 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:37094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfx8bysWC90G-1nBrAvNQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:24.946528 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:45388] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfyBI6lpbStxTqkSktYXwAAAkw"]
[Mon Mar 16 09:05:48.459476 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:59594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyHNSswJuvopo3lOhJ9gAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:50.879093 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:44584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyHnjZBu2q05ozVU8_HgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 09:06:00.919061 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:37110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyKHjZBu2q05ozVU8_OQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:06:06.190139 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:59980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyLnjZBu2q05ozVU8_SQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:06:13.882749 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:49282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyNXjZBu2q05ozVU8_WwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:06:15.226676 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:36874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyNxXjF1vJNtV6CWri0QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:06:22.259555 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:42254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyPo6lpbStxTqkSktYeQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:06:35.381404 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyS7ysWC90G-1nBrAvUgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:05.171203 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyadSswJuvopo3lOhKKAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:06.645387 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:51264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyaglT9VtDQc7bgUyTwAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:49.327363 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:42300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfylXjZBu2q05ozVU9AAwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:57.262760 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfynf9ocpUE4ed4uDzXNQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:57.614948 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.244.31:35720] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfyndSswJuvopo3lOhKNwAAAI4"]
[Mon Mar 16 09:08:15.503210 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:51266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyrwlT9VtDQc7bgUyUDgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:08:31.522788 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyvtSswJuvopo3lOhKTwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:08:36.183551 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:58208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyxAlT9VtDQc7bgUyUMQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:08:42.339450 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:58218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyynbQATo66fKoS7w2RAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:08:54.203412 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:47896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfy1njZBu2q05ozVU9ARQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:01.057920 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:42588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzVY6lpbStxTqkSktY5gAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:10.639361 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:41148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzXrysWC90G-1nBrAv_gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:34.079078 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:58686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzdrysWC90G-1nBrAwGwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:49.640301 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:58976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzhQlT9VtDQc7bgUyVeAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:54.887179 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:45396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzinbQATo66fKoS7w2gAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:55.711100 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:53750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzi5qj1wV0Si-OkefTFQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:03.541001 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:55442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzk9SswJuvopo3lOhKmQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:12:07.171204 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:40698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzlxXjF1vJNtV6CWrjqwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:37.159187 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:45410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfztbABkC4fWIHEf8HVcgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:39.180558 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:59284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfztxXjF1vJNtV6CWrj0AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:12:39.534930 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:45074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzt5qj1wV0Si-OkefTKAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:52.000728 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:58888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzwo6lpbStxTqkSktZHgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:58.659869 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:48636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfzyrABkC4fWIHEf8HVfgAAAFA"]
[Mon Mar 16 09:12:59.875344 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:52396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzyxXjF1vJNtV6CWrj2gAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:06.088043 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:49316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz0XjZBu2q05ozVU9AqgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:24.855582 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:36768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz5LABkC4fWIHEf8HVnwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:13:40.443973 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:33734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz9Jqj1wV0Si-OkefTUgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:45.982347 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:50356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz-RXjF1vJNtV6CWrj8wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:48.459210 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:50362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz_P9ocpUE4ed4uDzXtAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:13:58.643946 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:35396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0BglT9VtDQc7bgUyVvQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:20.206129 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:45850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0HHbQATo66fKoS7w25gAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:21.551466 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0HZqj1wV0Si-OkefTYwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:22.859267 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:49072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0Hpqj1wV0Si-OkefTZAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:27.330953 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:49078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0I7ysWC90G-1nBrAwawAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:31.430344 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:52700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0J_9ocpUE4ed4uDzX2QAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:32.737010 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:36454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0KJqj1wV0Si-OkefTagAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:39.731479 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:49088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0L3bQATo66fKoS7w29gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:52.975587 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:36460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0PLABkC4fWIHEf8HVxQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:15:08.515373 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:48636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0TI6lpbStxTqkSktZdQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:15:13.151266 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:43442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0Uf9ocpUE4ed4uDzX8wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:15:27.932568 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:43456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0X7ysWC90G-1nBrAwlQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:16:57.668054 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0uY6lpbStxTqkSktZ9wAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:04.483201 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:45022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wLysWC90G-1nBrAwqwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:05.187231 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wY6lpbStxTqkSktZ_gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:06.473702 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:44420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wpqj1wV0Si-OkefT_QAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:08.803531 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:44428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0xJqj1wV0Si-OkefUAwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:16.219915 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0zBXjF1vJNtV6CWrkOgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:17.503064 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:36554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0zZqj1wV0Si-OkefUEAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:19.769897 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:36562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0znjZBu2q05ozVU9BGAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:23.255021 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:42440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf00wlT9VtDQc7bgUyWEAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:39.216091 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:42456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf047ysWC90G-1nBrAwxQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:42.640840 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf05hXjF1vJNtV6CWrkQQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:43.930965 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:41164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf05xXjF1vJNtV6CWrkQgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:45.291093 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:41172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf06dSswJuvopo3lOhLdgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:48.715335 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:41180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf07AlT9VtDQc7bgUyWHAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:50.013181 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:41192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf07rABkC4fWIHEf8HWAwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:51.440793 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:56696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf073bQATo66fKoS7w3egAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:52.791037 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:56706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf08P9ocpUE4ed4uDzYHAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:54.131040 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:56714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf08rysWC90G-1nBrAwyAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:57.590543 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:56718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf09f9ocpUE4ed4uDzYIQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:58.906236 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:56726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf09o6lpbStxTqkSktaEQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:08.740667 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:60304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ABXjF1vJNtV6CWrkUwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:12.139722 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:60318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1BLABkC4fWIHEf8HWDAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:13.429423 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:40700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1BRXjF1vJNtV6CWrkVQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:15.607526 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:40712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1B_9ocpUE4ed4uDzYJgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:16.886770 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:40722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1CI6lpbStxTqkSktaGAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:18.675515 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:45034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1Cpqj1wV0Si-OkefUUAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:20.278010 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:40738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1DHjZBu2q05ozVU9BIgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:22.063412 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:60312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1DhXjF1vJNtV6CWrkWwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:29.367261 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:60324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1FXbQATo66fKoS7w3hwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:35.214881 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:60324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1G3bQATo66fKoS7w3jQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:51.895835 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:58932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1KhXjF1vJNtV6CWrkcwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:42.874556 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:58168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1XglT9VtDQc7bgUyWbQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:46.301943 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:57140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1YhXjF1vJNtV6CWrkfwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:56.772863 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:57142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1bI6lpbStxTqkSktaOAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:58.653982 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1bnbQATo66fKoS7w3qwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:08.384468 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1eP9ocpUE4ed4uDzYiwAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:09.739052 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:46996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ebysWC90G-1nBrAw6wAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:11.267648 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:38618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ewlT9VtDQc7bgUyWdQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:12.560779 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:38622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1fHbQATo66fKoS7w3rwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:14.743359 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:52724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1fv9ocpUE4ed4uDzYkQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:20:16.007020 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:38634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1gJqj1wV0Si-OkefUeQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:17.285925 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1gbysWC90G-1nBrAw7gAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:19.247159 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:33366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1g9SswJuvopo3lOhLxwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:20.878829 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:38658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hLABkC4fWIHEf8HWLwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:22.107024 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:58560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hrysWC90G-1nBrAw8QAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:23.390901 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:58566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hxXjF1vJNtV6CWrkjgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:24.749532 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:58572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1iBXjF1vJNtV6CWrkkQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:27.087413 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:58578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1i_9ocpUE4ed4uDzYlwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:28.394600 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:58584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jNSswJuvopo3lOhLzAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:29.180368 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.228.16:33038] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf1jQlT9VtDQc7bgUyWeQAAAQ4"]
[Mon Mar 16 09:20:29.706940 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:58586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jZqj1wV0Si-OkefUggAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:30.961497 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:48036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jpqj1wV0Si-OkefUgwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:32.231161 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:48044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kP9ocpUE4ed4uDzYmAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:34.158641 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:48048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kXbQATo66fKoS7w3tQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:35.477905 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:48062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kwlT9VtDQc7bgUyWfQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:36.755584 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:48064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1lP9ocpUE4ed4uDzYmQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:39.088604 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:48068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1l5qj1wV0Si-OkefUiAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:40.359388 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:56052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mP9ocpUE4ed4uDzYnAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:41.658126 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:56058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mXbQATo66fKoS7w3uAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:42.978848 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:56070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mnbQATo66fKoS7w3vQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:44.277988 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:56080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nHjZBu2q05ozVU9BjQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:45.573658 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:56094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nZqj1wV0Si-OkefUjQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:46.864260 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:56096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nhXjF1vJNtV6CWrklQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:48.167064 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:56112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1oI6lpbStxTqkSktaSQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:49.335117 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:56126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1obysWC90G-1nBrAw-gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:52.081311 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:41464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ohXjF1vJNtV6CWrkmQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:53.507595 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1pf9ocpUE4ed4uDzYogAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:55.890975 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:41480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1p7ysWC90G-1nBrAw_wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:05.482302 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:42872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1sbABkC4fWIHEf8HWWAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:08.644572 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:45238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1tBXjF1vJNtV6CWrknAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:21:20.846304 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:41486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1wP9ocpUE4ed4uDzYvAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:29.578941 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:45246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ydSswJuvopo3lOhMAgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:29.580180 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:44332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1yNSswJuvopo3lOhMAAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:30.913962 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:45412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1yglT9VtDQc7bgUyWiQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:32.205925 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:45428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1zAlT9VtDQc7bgUyWigAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:34.166952 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:37872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ztSswJuvopo3lOhMCAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:34.803169 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:45434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1zglT9VtDQc7bgUyWkgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:36.147272 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:45442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf10HjZBu2q05ozVU9BuAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:54.307946 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:45446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf14nbQATo66fKoS7w30wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:01.671340 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:33294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf16QlT9VtDQc7bgUyWmwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:08.922614 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:35984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf18Jqj1wV0Si-OkefUwgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:14.376141 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:40766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf19rysWC90G-1nBrAxEgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:15.940083 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:40768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf19wlT9VtDQc7bgUyWoQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:35.428580 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:40772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2CZqj1wV0Si-OkefU6gAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:37.805060 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:43078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2DQlT9VtDQc7bgUyWrQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:39.115043 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:43082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2DwlT9VtDQc7bgUyWsAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:50.134385 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:57678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2GnjZBu2q05ozVU9B1AAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:52.565645 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:44340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2HLABkC4fWIHEf8HWigAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:59.560293 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:44348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2IxXjF1vJNtV6CWrkuQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:02.011265 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:36110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2JnjZBu2q05ozVU9B3QAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:05.883996 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:56384] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf2KdSswJuvopo3lOhMHQAAAIU"]
[Mon Mar 16 09:23:18.592482 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:36116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2M7ABkC4fWIHEf8HWrQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:28.110384 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:33348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2QBXjF1vJNtV6CWrkzwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:32.628813 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:38962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2RBXjF1vJNtV6CWrk0gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:33.907275 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:45170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2RXbQATo66fKoS7w38AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:35.369157 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:45186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2R3bQATo66fKoS7w39QAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:37.920831 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:45200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2SRXjF1vJNtV6CWrk3QAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:42.969383 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:45212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2TtSswJuvopo3lOhMKwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:10.400337 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:57366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2anbQATo66fKoS7w4EwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:11.759056 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:32832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2axXjF1vJNtV6CWrk6AAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:42.105040 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:32834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2io6lpbStxTqkSkta_gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:59.136200 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:40236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2m7ABkC4fWIHEf8HW2AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:10.483757 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:40664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2prABkC4fWIHEf8HW4gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:19.935142 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:38822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2r5qj1wV0Si-OkefVTgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:30.757019 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:54450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2urABkC4fWIHEf8HW7wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:32.410520 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.228.16:52294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf2vP9ocpUE4ed4uDzY_wAAAg8"]
[Mon Mar 16 09:25:51.275153 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:39468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2z_9ocpUE4ed4uDzZIAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:58.831852 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:47886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf21rABkC4fWIHEf8HW-gAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:26:00.137582 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf22HjZBu2q05ozVU9CJwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:26:52.876806 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3DNSswJuvopo3lOhMiQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:26:54.197981 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:59922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Dv9ocpUE4ed4uDzZKgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:13.119247 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:59938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3IXbQATo66fKoS7w4eQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:14.400396 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:56574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Ipqj1wV0Si-OkefVfQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:15.675301 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3I7ysWC90G-1nBrAxfQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:16.982990 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:56604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3JI6lpbStxTqkSktbVQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:18.980632 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:56612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3JrysWC90G-1nBrAxfwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:22.444043 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3KrABkC4fWIHEf8HXDwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:26.191346 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:37388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3LglT9VtDQc7bgUyX2AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:27.500387 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:37390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3L3bQATo66fKoS7w4hwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:28.660973 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:37394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3MLABkC4fWIHEf8HXEQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:31.031530 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:37404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3MwlT9VtDQc7bgUyX2gAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:32.392555 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:45130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NNSswJuvopo3lOhMlQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:33.579027 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:45142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NbABkC4fWIHEf8HXEgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:34.912282 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:45158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NrABkC4fWIHEf8HXEwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:36.281019 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:45174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3OJqj1wV0Si-OkefVggAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:37.437048 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3OQlT9VtDQc7bgUyX3QAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:41.701658 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:45192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3PRXjF1vJNtV6CWrlJQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:49.515777 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:57332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3RbysWC90G-1nBrAxhgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:50.842874 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Ro6lpbStxTqkSktbdAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:07.682883 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.244.31:60468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf3V3jZBu2q05ozVU9CPgAAAU4"]
[Mon Mar 16 09:28:15.827327 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:43796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3X7ysWC90G-1nBrAxpgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:18.152803 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3YrABkC4fWIHEf8HXGwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:21.794954 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:45974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3ZXbQATo66fKoS7w4xAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:23.412020 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:58104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Z9SswJuvopo3lOhMmgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:29:08.573186 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:58120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3lLABkC4fWIHEf8HXSQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:29:20.705895 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:54696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3oP9ocpUE4ed4uDzZRgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:06.363683 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3zo6lpbStxTqkSktbwAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:09.779926 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:50514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf30Y6lpbStxTqkSktbwwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:11.091335 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:48480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf30wlT9VtDQc7bgUyX-gAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:12.412603 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:48490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf31NSswJuvopo3lOhMsQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:15.042827 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf313jZBu2q05ozVU9CVgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:25.219880 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:48498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf34Y6lpbStxTqkSktbzwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:40.059715 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.228.16:39626] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf38P9ocpUE4ed4uDzZVwAAAgg"]
[Mon Mar 16 09:30:43.669055 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:38564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf383jZBu2q05ozVU9CZwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:48.058987 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:59846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3-AlT9VtDQc7bgUyYEgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:50.507019 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:59852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3-pqj1wV0Si-OkefVvQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:31:07.042925 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:58358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4C9SswJuvopo3lOhMvwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:01.355746 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:43448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4QXbQATo66fKoS7w5ZQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:02.702523 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4QrysWC90G-1nBrAxsgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:05.055308 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:41152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4RdSswJuvopo3lOhMyQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:11.251215 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:41156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4SwlT9VtDQc7bgUyYaAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:37.540467 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:43860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ZdSswJuvopo3lOhM4AAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:40.074743 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:46108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4aP9ocpUE4ed4uDzZaQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:43.470950 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:53686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4axXjF1vJNtV6CWrlvgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:33:04.915155 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:53694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4gBXjF1vJNtV6CWrl0wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:33:13.383331 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.244.31:54500] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf4iZqj1wV0Si-OkefWKQAAAAA"]
[Mon Mar 16 09:33:14.104456 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:39982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4itSswJuvopo3lOhM7gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:15.411309 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:50994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4i3bQATo66fKoS7w5bQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:16.982308 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:50996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4jJqj1wV0Si-OkefWKgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:18.271498 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:51008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4jv9ocpUE4ed4uDzZbwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:19.423757 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:51010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4j3jZBu2q05ozVU9ChQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:20.711030 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:59932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4kBXjF1vJNtV6CWrl1gAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:21.991042 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:59946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4kXbQATo66fKoS7w5cAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:29.410214 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:59956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4mRXjF1vJNtV6CWrl3QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:30.695793 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4mnjZBu2q05ozVU9CiAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:31.867489 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:58922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4m3jZBu2q05ozVU9CiQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:33.185986 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:58934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ndSswJuvopo3lOhM8QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:39.931662 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:58948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4o3bQATo66fKoS7w5egAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:42.307063 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:39118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4pglT9VtDQc7bgUyYwQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:44.755571 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:39124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4qHbQATo66fKoS7w5fAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:46.046644 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:39140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4qhXjF1vJNtV6CWrl3wAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:48.444364 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:39150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4rI6lpbStxTqkSktb8AAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:49.737299 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:39164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4rbysWC90G-1nBrAxywAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:58.239218 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:48032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4tv9ocpUE4ed4uDzZhAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:00.563157 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:48042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4uLysWC90G-1nBrAx0gAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:01.847970 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:41662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ubABkC4fWIHEf8HXqAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:04.452338 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:41676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4vHjZBu2q05ozVU9CkAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:05.737201 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:41688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4vY6lpbStxTqkSktb9AAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:14.419082 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:41696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4xhXjF1vJNtV6CWrl7AAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:15.723504 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:47654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4x46lpbStxTqkSktb9QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:17.277933 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:47662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ybysWC90G-1nBrAx0wAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:19.612624 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:47674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ynbQATo66fKoS7w5fwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:36.305949 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:51944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf43LysWC90G-1nBrAx6AAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:37.565192 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:45290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf43dSswJuvopo3lOhNAQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:49.123301 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:45304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf46XjZBu2q05ozVU9CnwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:12.242242 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:48422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5AAlT9VtDQc7bgUyZOAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:14.639469 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:42474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5AhXjF1vJNtV6CWrl_AAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:32.416473 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:42488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5FNSswJuvopo3lOhNIAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:38.272358 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:48088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5GhXjF1vJNtV6CWrmCAAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:39.607046 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5G3jZBu2q05ozVU9CqgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:35:40.102249 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.228.16:40736] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf5HLABkC4fWIHEf8HX6wAAAFI"]
[Mon Mar 16 09:35:45.087497 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:44048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5IZqj1wV0Si-OkefWWwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:35:48.491766 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:44062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5JJqj1wV0Si-OkefWXgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:50.869582 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:44064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5JnjZBu2q05ozVU9CsgAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:58.135793 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:33532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5Lo6lpbStxTqkSktcFAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:59.400171 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:33542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5L9SswJuvopo3lOhNJgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:01.202841 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5MAlT9VtDQc7bgUyZSgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:03.659407 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:41754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5M9SswJuvopo3lOhNKgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:06.009535 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:41770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5NnbQATo66fKoS7w5zwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:23.308035 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:41772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5R5qj1wV0Si-OkefWbwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:25.900534 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:59468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5SdSswJuvopo3lOhNMQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:27.185989 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5S5qj1wV0Si-OkefWcAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:29.556414 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:59486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5TbABkC4fWIHEf8HX-wAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:24.467554 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:41498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5hLABkC4fWIHEf8HYPAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:37:25.746313 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:60984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5hf9ocpUE4ed4uDzaCAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:30.477937 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5iv9ocpUE4ed4uDzaDQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:46.000148 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:42904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5mdSswJuvopo3lOhNSQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:38:15.574080 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:55554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf5t7ABkC4fWIHEf8HYTAAAAEM"]
[Mon Mar 16 09:38:39.515527 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:49042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5z_9ocpUE4ed4uDzaRQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:38:41.930961 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:51928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf50Zqj1wV0Si-OkefWlgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:08.600871 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:51932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf57HbQATo66fKoS7w6MAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:35.901326 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:40422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6B3jZBu2q05ozVU9DXwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:42.731427 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:48180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6DnbQATo66fKoS7w6OwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:39:45.106351 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:44032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6EY6lpbStxTqkSktcQwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:39:48.471385 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:44034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6FNSswJuvopo3lOhNXAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:53.614421 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:44046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6GZqj1wV0Si-OkefWxAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:01.276374 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:38524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6IZqj1wV0Si-OkefW0wAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:04.589941 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:59698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6JP9ocpUE4ed4uDzaWAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:11.077264 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:59704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6K3jZBu2q05ozVU9DaQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:12.422372 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:58412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6LLABkC4fWIHEf8HYXgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:13.691411 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:58422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6LbysWC90G-1nBrAynQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:15.006594 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:58434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6L46lpbStxTqkSktcSgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:16.176323 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:58436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6MI6lpbStxTqkSktcSwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:17.506361 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:58452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6MY6lpbStxTqkSktcTQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:18.775540 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:58460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Mo6lpbStxTqkSktcTwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:19.926378 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:58474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6M46lpbStxTqkSktcUQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:21.192863 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:54058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Nf9ocpUE4ed4uDzaXQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:22.528765 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:54064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Npqj1wV0Si-OkefW5QAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:23.853921 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:54078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6N3jZBu2q05ozVU9DagAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:25.142781 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:54086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6OQlT9VtDQc7bgUyZogAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:26.277949 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:54092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Opqj1wV0Si-OkefW7QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:27.678988 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:54106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6O3bQATo66fKoS7w6SAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:29.029184 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:54108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6PY6lpbStxTqkSktcVQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:30.391539 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:53922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Po6lpbStxTqkSktcWgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:31.775058 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:53938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6P_9ocpUE4ed4uDzaXwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:33.120128 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:53942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6QZqj1wV0Si-OkefW9AAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:34.400858 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:53958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6QnbQATo66fKoS7w6TQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:35.833952 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:53966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Q5qj1wV0Si-OkefW-QAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:37.036787 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:53972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RY6lpbStxTqkSktcXQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:38.325610 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:53986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RrABkC4fWIHEf8HYZwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:39.679354 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:53994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RxXjF1vJNtV6CWrmTQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:41.920071 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6SQlT9VtDQc7bgUyZpwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:41.924013 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.228.16:44058] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf6Sf9ocpUE4ed4uDzaZAAAAgw"]
[Mon Mar 16 09:40:43.445998 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:38928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6S3bQATo66fKoS7w6UAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:44.819917 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:38934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TLysWC90G-1nBrAyugAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:45.935532 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:38948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TdSswJuvopo3lOhNZwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:47.258914 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:38960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TwlT9VtDQc7bgUyZqAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:48.559034 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:38974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6UI6lpbStxTqkSktcXgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:49.840030 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:38978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6URXjF1vJNtV6CWrmUwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:50.999138 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:51960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6UnbQATo66fKoS7w6UwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:53.408773 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6VLysWC90G-1nBrAywwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:54.683866 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:51972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Vpqj1wV0Si-OkefXCgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:56.009951 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:51976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6WBXjF1vJNtV6CWrmVgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:57.303048 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:51988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Wf9ocpUE4ed4uDzaaAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:59.095214 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:51994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6W7ysWC90G-1nBrAyywAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:00.477496 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:33494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6XHbQATo66fKoS7w6VQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:01.790230 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:33500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6XXbQATo66fKoS7w6VgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:03.131537 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:33504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6X9SswJuvopo3lOhNaAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:04.494184 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:33508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YAlT9VtDQc7bgUyZrgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:05.805593 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YXbQATo66fKoS7w6WwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:07.071546 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:33524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YwlT9VtDQc7bgUyZrwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:08.347929 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:33538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ZBXjF1vJNtV6CWrmWwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:09.694233 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:33550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ZXjZBu2q05ozVU9DcgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:11.014128 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:54410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Z_9ocpUE4ed4uDzabAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:12.172396 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6aNSswJuvopo3lOhNaQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:13.474765 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:54424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6aQlT9VtDQc7bgUyZsQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:14.803347 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:54440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ahXjF1vJNtV6CWrmXQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:15.991523 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:54444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6a3jZBu2q05ozVU9DcwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:17.242730 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:54456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6bQlT9VtDQc7bgUyZswAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:18.775825 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:54460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6bo6lpbStxTqkSktcYwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:20.086620 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:54474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cJqj1wV0Si-OkefXIwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:21.481583 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:37132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cY6lpbStxTqkSktcZAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:22.820047 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:37136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cnbQATo66fKoS7w6XwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:24.130746 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:37142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dNSswJuvopo3lOhNbgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:25.410501 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:37144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dbysWC90G-1nBrAy4wAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:26.667084 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:37150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dtSswJuvopo3lOhNbwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:27.823168 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6d9SswJuvopo3lOhNcAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:29.236062 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:37178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6eY6lpbStxTqkSktcbQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:30.581672 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:46800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6eo6lpbStxTqkSktcbwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:31.888918 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:46802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6e3bQATo66fKoS7w6YQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:33.179789 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:46810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6fdSswJuvopo3lOhNcQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:34.545236 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:46818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6frysWC90G-1nBrAy7QAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:35.872126 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:46828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6f7ABkC4fWIHEf8HYcwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:37.162774 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:46836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6gXjZBu2q05ozVU9DdwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:38.487083 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:46850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6gglT9VtDQc7bgUyZuQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:39.831797 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:46854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6g3bQATo66fKoS7w6YgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:41.147330 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:36294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hdSswJuvopo3lOhNcwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:42.506905 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:36296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hv9ocpUE4ed4uDzadAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:43.723748 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:36310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hxXjF1vJNtV6CWrmYQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:45.045458 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6idSswJuvopo3lOhNdAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:46.347051 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:36332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6injZBu2q05ozVU9DeQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:47.687123 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:36344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6i_9ocpUE4ed4uDzadwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:49.005370 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:36354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jf9ocpUE4ed4uDzaeAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:50.311443 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:55704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jtSswJuvopo3lOhNdgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:51.671065 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:55720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jxXjF1vJNtV6CWrmZAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:52.853499 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:55728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6kJqj1wV0Si-OkefXLAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:54.175387 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:55738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6knbQATo66fKoS7w6awAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:55.323066 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:55746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6k9SswJuvopo3lOhNeAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:57.027682 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:55762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6lJqj1wV0Si-OkefXLQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:58.418286 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:55770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ltSswJuvopo3lOhNfAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:00.680673 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:55782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6mHjZBu2q05ozVU9DhQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:02.024126 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:56746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6mglT9VtDQc7bgUyZwAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:03.393015 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:56752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6m3jZBu2q05ozVU9DiAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:04.755150 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:56766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6nBXjF1vJNtV6CWrmZQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:06.103472 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:56772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ntSswJuvopo3lOhNfQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:07.437517 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:56778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6n7ysWC90G-1nBrAy_wAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:08.581679 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:56794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6oBXjF1vJNtV6CWrmZwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:11.186317 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:56804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6o3bQATo66fKoS7w6cwAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:12.494363 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6pP9ocpUE4ed4uDzakQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:13.801554 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:60066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6pZqj1wV0Si-OkefXNgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:15.078542 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:60078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6p7ABkC4fWIHEf8HYfAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:16.263555 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:60088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qP9ocpUE4ed4uDzalQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:17.539747 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:60104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qXjZBu2q05ozVU9DjAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:18.858927 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qhXjF1vJNtV6CWrmaQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:20.035450 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:60124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6rAlT9VtDQc7bgUyZyQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:21.296665 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:50384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6rY6lpbStxTqkSktcoQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:22.582871 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:50386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ro6lpbStxTqkSktcowAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:23.887351 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:50402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6r7ABkC4fWIHEf8HYfwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:25.067759 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:50410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6sY6lpbStxTqkSktcqAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:26.366687 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:50416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6stSswJuvopo3lOhNhgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:27.935217 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:50430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6s9SswJuvopo3lOhNhwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:29.295082 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:50438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6tQlT9VtDQc7bgUyZywAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:30.676888 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:52818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6trysWC90G-1nBrAzBAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:31.988529 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:52830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6t_9ocpUE4ed4uDzapAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:41.705209 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:52834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6wQlT9VtDQc7bgUyZ2QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:47.335355 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:38022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6xwlT9VtDQc7bgUyZ4gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:58.896384 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:39232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf60o6lpbStxTqkSktcxwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:43:12.127787 2026] [:error] [pid 21533:tid 140411582465792] [client 87.121.84.97:53430] [client 87.121.84.97] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/server/php/index.php"] [unique_id "abf633jZBu2q05ozVU9DoAAAAVM"]
[Mon Mar 16 09:43:29.314959 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:38032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf68HbQATo66fKoS7w6qgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:43:30.655269 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:55584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf68hXjF1vJNtV6CWrmeAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:43:37.278196 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:55592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6-QlT9VtDQc7bgUyZ_QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:43:38.491753 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:55608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6-v9ocpUE4ed4uDza6wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:44:41.322558 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:45096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7ObysWC90G-1nBrAziQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:44:44.811439 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:46716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7PP9ocpUE4ed4uDzbEwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:44:48.246220 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:46720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7QHjZBu2q05ozVU9DxgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:45:03.758275 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:54644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7T5qj1wV0Si-OkefXogAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:45:07.418921 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:55878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7U5qj1wV0Si-OkefXpwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:08.755416 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:53926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7VAlT9VtDQc7bgUyaHgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:19.873550 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:53936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7X46lpbStxTqkSktc-gAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:50.030806 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:54792] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf7fnjZBu2q05ozVU9D7wAAAUU"]
[Mon Mar 16 09:46:26.553793 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:36994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7onjZBu2q05ozVU9EEwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:27.882456 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:42356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7o7ysWC90G-1nBrAzqAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:30.239396 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:42366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7po6lpbStxTqkSktdGAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:31.722040 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.241.46:57258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7pxXjF1vJNtV6CWrnLwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:38.471030 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:42338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7rv9ocpUE4ed4uDzbTAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:47:23.510597 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:49892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf72_9ocpUE4ed4uDzbpAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:16.835014 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:48634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf8EHbQATo66fKoS7w7DAAAAMQ"]
[Mon Mar 16 09:48:26.168179 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:56032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8Gv9ocpUE4ed4uDzb4wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:27.478706 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:49218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8G46lpbStxTqkSktdPQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:48:39.378929 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8J7ysWC90G-1nBrAz0QAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:44.452251 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8LHjZBu2q05ozVU9EeQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:45.532351 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:34646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8LXbQATo66fKoS7w7GQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:48:49.619537 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:34660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8MAlT9VtDQc7bgUyaYAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:49:20.506224 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:39596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8UP9ocpUE4ed4uDzcCQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:44.133947 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:57882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8pNSswJuvopo3lOhOaAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:50:46.682994 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:47374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8pnbQATo66fKoS7w7mwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:47.706481 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:51898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8p5qj1wV0Si-OkefYGgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:50:50.123062 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8qnjZBu2q05ozVU9EnAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:51.789049 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.228.16:53684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf8qpqj1wV0Si-OkefYHQAAABI"]
[Mon Mar 16 09:50:54.975139 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:50026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8rnjZBu2q05ozVU9EogAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:51:24.195625 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:50042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8zAlT9VtDQc7bgUyaswAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:51:57.628661 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:57850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf87XbQATo66fKoS7w71wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:52:03.283301 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:60936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf88wlT9VtDQc7bgUyaygAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:20.905973 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:35266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9A7ysWC90G-1nBrA0hgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:23.464565 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:34480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9BwlT9VtDQc7bgUyazgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:28.203100 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:34488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9DLABkC4fWIHEf8HZ-gAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:32.867771 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:34498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9ENSswJuvopo3lOhOiQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:36.408717 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:38882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9FBXjF1vJNtV6CWrnnAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:38.791068 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:38896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9FnjZBu2q05ozVU9ExQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:39.351677 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9F_9ocpUE4ed4uDzcUgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:52:42.303796 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:36326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9GrABkC4fWIHEf8HaAAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:43.643146 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:36330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9G3bQATo66fKoS7w74wAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:48.362868 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:36336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9IAlT9VtDQc7bgUya3gAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:50.764494 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:36342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9ItSswJuvopo3lOhOmQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:53:11.583692 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:40246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9N9SswJuvopo3lOhOqwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:53:14.931003 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:57620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9OglT9VtDQc7bgUya6gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:53:17.655069 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.244.31:48278] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf9PRXjF1vJNtV6CWrnqAAAAco"]
[Mon Mar 16 09:53:17.657256 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:57626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9PBXjF1vJNtV6CWrnpgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:55:51.263382 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:39140] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf917ABkC4fWIHEf8HajAAAAFg"]
[Mon Mar 16 09:56:17.287753 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf98Y6lpbStxTqkSktebAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:58:18.347857 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.244.31:49626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf-aglT9VtDQc7bgUybYAAAAQw"]
[Mon Mar 16 09:59:55.941389 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:36302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf-ywlT9VtDQc7bgUyb7gAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:59:57.387329 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:60950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf-zbysWC90G-1nBrA1LwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:00:52.353315 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.228.16:47912] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf_BBXjF1vJNtV6CWrpEAAAAcg"]
[Mon Mar 16 10:01:01.878555 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.241.46:38928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_DXbQATo66fKoS7w9EQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:03.279776 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:38142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_D3jZBu2q05ozVU9GIQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:07.671491 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:38144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_EwlT9VtDQc7bgUycIQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:10.059531 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:50846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Fv9ocpUE4ed4uDzc8QAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:13.618282 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:50858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_GY6lpbStxTqkSkte0QAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:16.464687 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:50872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_G3bQATo66fKoS7w9FgAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:17.755097 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_HdSswJuvopo3lOhQPwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:18.938398 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:51116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Hv9ocpUE4ed4uDzc8gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:21.266251 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:51128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_IZqj1wV0Si-OkefZrQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:23.563179 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:51130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_I5qj1wV0Si-OkefZsQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:28.091249 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:51146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_KBXjF1vJNtV6CWrpNQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:29.382970 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Kf9ocpUE4ed4uDzc_QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:31.756872 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:45958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_K5qj1wV0Si-OkefZtQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:34.079977 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:45974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_LglT9VtDQc7bgUycMAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:36.427238 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:45990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_MHjZBu2q05ozVU9GNAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:38.785461 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:45998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_MrABkC4fWIHEf8Ha-wAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:40.230696 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:53112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NJqj1wV0Si-OkefZuwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:41.430663 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:53124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NbysWC90G-1nBrA1SwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:43.707514 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:53136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NrysWC90G-1nBrA1TgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:46.037950 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:53148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_OnjZBu2q05ozVU9GPgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:49.905261 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:53160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_PI6lpbStxTqkSkte4AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:53.570298 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:35296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_QXbQATo66fKoS7w9JQAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:59.063739 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:35312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_R7ABkC4fWIHEf8HbCAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:00.340209 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:49444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_SI6lpbStxTqkSkte5AAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:04.836832 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.241.46:49458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_THbQATo66fKoS7w9LgAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:06.130453 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:49460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Tpqj1wV0Si-OkefZxwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:08.282463 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:49462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_UHjZBu2q05ozVU9GRQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:10.683069 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:44428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_UnbQATo66fKoS7w9NAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:12.963350 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:44434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_VLABkC4fWIHEf8HbEAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:17.472901 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:44440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_WHjZBu2q05ozVU9GSwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:24.227011 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:39456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_YJqj1wV0Si-OkefZ0QAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:27.715898 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:39458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Y5qj1wV0Si-OkefZ2QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:47.184536 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:36848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_d3jZBu2q05ozVU9GYAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:49.576283 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:41462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ebysWC90G-1nBrA1bAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:53.134059 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:41476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ff9ocpUE4ed4uDzdHgAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:13.275062 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:41478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_kbysWC90G-1nBrA1gAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:15.577420 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:39358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ktSswJuvopo3lOhQ0wAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:18.348530 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf_ltSswJuvopo3lOhQ1gAAAIs"]
[Mon Mar 16 10:03:19.211089 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:39360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_l7ABkC4fWIHEf8HbOAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:53.837699 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:52736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_uXbQATo66fKoS7w9_AAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:57.254981 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_vZqj1wV0Si-OkefaBwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:05:50.369209 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:54834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgALv9ocpUE4ed4uDzeEQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:05:53.509198 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:60210] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgAMXjZBu2q05ozVU9GnQAAAVM"]
[Mon Mar 16 10:05:54.946692 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:44602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAMhXjF1vJNtV6CWrqFwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:03.030373 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:44188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAO5qj1wV0Si-OkefaHAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:03.518690 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:58588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAO3bQATo66fKoS7w-XgAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:11.950036 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:56372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAQ7ysWC90G-1nBrA1qAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:15.350116 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:49976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAR3bQATo66fKoS7w-YwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:23.584925 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:49978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgATxXjF1vJNtV6CWrqIAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:28.924667 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:46714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAVLysWC90G-1nBrA1rgAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:30.079530 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:60806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAVglT9VtDQc7bgUycqAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:31.340411 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:57626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAV7ysWC90G-1nBrA1sgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:32.768103 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:57640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWBXjF1vJNtV6CWrqIgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:34.015313 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:57648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWpqj1wV0Si-OkefaHwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:35.199102 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.241.46:57656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWwlT9VtDQc7bgUycqQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:55.614115 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:57662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAb7ysWC90G-1nBrA10gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:56.723137 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:38704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAcLysWC90G-1nBrA10wAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:56.914964 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:40454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAcP9ocpUE4ed4uDzeTAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:59.172273 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:35416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAc3bQATo66fKoS7w-agAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:02.280221 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:50476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAdglT9VtDQc7bgUyctQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:07:03.561634 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:48548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAd7ABkC4fWIHEf8HbYwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:05.999699 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:35418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAebysWC90G-1nBrA11AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:07.165778 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAe9SswJuvopo3lOhRBgAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:10.192394 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:59900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAftSswJuvopo3lOhRCAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:11.471581 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:59912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAfxXjF1vJNtV6CWrqJwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:12.828081 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:59920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAgJqj1wV0Si-OkefaJQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:15.951699 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:48560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAg3bQATo66fKoS7w-dAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:20.455474 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:59926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAiLysWC90G-1nBrA12wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:25.931354 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:56020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAjdSswJuvopo3lOhRDwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:28.033506 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:56026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAjwlT9VtDQc7bgUycvQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:29.490973 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:41904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAkZqj1wV0Si-OkefaJwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:30.637214 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:41918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAkv9ocpUE4ed4uDzeYQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:31.926900 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:41924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAk7ysWC90G-1nBrA13AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:33.220278 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:41934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlZqj1wV0Si-OkefaKAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:34.554890 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:41946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlrABkC4fWIHEf8HbdQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:35.725528 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:41952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlwlT9VtDQc7bgUycxAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:37.040836 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:41964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAmRXjF1vJNtV6CWrqLAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:38.206426 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:41596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAmhXjF1vJNtV6CWrqLgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:42.901504 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAnv9ocpUE4ed4uDzeaAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:44.203077 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:41610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAoJqj1wV0Si-OkefaKwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:45.383297 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:41622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAobysWC90G-1nBrA13wAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:46.645481 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:41626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAoglT9VtDQc7bgUyczgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:47.884641 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:41628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAo5qj1wV0Si-OkefaLgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:49.193977 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:40552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgApdSswJuvopo3lOhRGAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:50.507316 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:40558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAprysWC90G-1nBrA14AAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:52.181573 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:40570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAp3jZBu2q05ozVU9GygAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:53.877365 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:40578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAqf9ocpUE4ed4uDzeaQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:55.191852 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:40582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAq9SswJuvopo3lOhRGQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:56.511820 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:40598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgArJqj1wV0Si-OkefaMAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:58.695156 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:40608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgArpqj1wV0Si-OkefaMgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:59.669164 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:56964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAr3jZBu2q05ozVU9G0gAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:00.114723 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:38782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAsHjZBu2q05ozVU9G0wAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:03.626562 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.241.46:38784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAs5qj1wV0Si-OkefaNgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:12.279765 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAvI6lpbStxTqkSktfsgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:14.568098 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:38788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAvpqj1wV0Si-OkefaQgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:18.315813 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.244.31:57950] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgAwpqj1wV0Si-OkefaSQAAAAk"]
[Mon Mar 16 10:08:21.055472 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAxZqj1wV0Si-OkefaTAAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:23.384434 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:51426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAx7ABkC4fWIHEf8HbpQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:25.687331 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:51434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAyQlT9VtDQc7bgUydBAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:09:23.198897 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:51438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBAxXjF1vJNtV6CWrqYwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:24.483041 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:51694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBBLABkC4fWIHEf8Hb0wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:31.131225 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:51710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBC5qj1wV0Si-OkefaXwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:36.068021 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBEP9ocpUE4ed4uDzedAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:42.817353 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:40174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBFrysWC90G-1nBrA16QAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:09:46.468220 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBGnbQATo66fKoS7w-hQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:47.817621 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:39776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBG_9ocpUE4ed4uDzedwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:49.110990 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:39784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBHY6lpbStxTqkSktfvwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:50.453034 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:42972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBHv9ocpUE4ed4uDzeeAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:51.749460 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:42978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBH3bQATo66fKoS7w-iAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:53.039530 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:42986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBIf9ocpUE4ed4uDzeegAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:54.345948 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBIrABkC4fWIHEf8Hb7QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:56.860082 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:43008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBJLysWC90G-1nBrA17QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:58.135912 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:43018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBJhXjF1vJNtV6CWrqZwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:02.278379 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:43026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBKglT9VtDQc7bgUydnQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:03.609859 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:34712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBK7ysWC90G-1nBrA17gAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:06.031217 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:34718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBLpqj1wV0Si-OkefaZwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:07.387149 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:34726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBL3jZBu2q05ozVU9G6gAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:08.660054 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBMI6lpbStxTqkSktfwQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:10.790871 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBMrysWC90G-1nBrA17wAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:12.070971 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:40392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBNP9ocpUE4ed4uDzefQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:13.347318 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:40404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBNbysWC90G-1nBrA18QAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:15.526966 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:40408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBN3jZBu2q05ozVU9G7QAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:16.856069 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:40412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBOLysWC90G-1nBrA18gAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:19.553902 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:40424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBOpqj1wV0Si-OkefaaAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:20.897689 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:44588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBPBXjF1vJNtV6CWrqawAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:22.341630 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBPhXjF1vJNtV6CWrqbQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:24.629989 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQP9ocpUE4ed4uDzegwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:25.950927 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:44630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQZqj1wV0Si-OkefaaQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:27.417834 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:44646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQ_9ocpUE4ed4uDzehAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:28.720625 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:44676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBRI6lpbStxTqkSktfxAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:29.985692 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:44684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBRdSswJuvopo3lOhRVgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:32.579856 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:50212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBSNSswJuvopo3lOhRXQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:34.063818 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:50222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBStSswJuvopo3lOhRXwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:35.377183 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:50228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBS3jZBu2q05ozVU9G7gAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:36.675085 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:50238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBTI6lpbStxTqkSktfyAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:43.179800 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:40480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBUv9ocpUE4ed4uDzelwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:44.603726 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:40494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBVLABkC4fWIHEf8HcJAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:45.769149 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:40500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBVbABkC4fWIHEf8HcJgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:47.041029 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:40508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBV_9ocpUE4ed4uDzemgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:49.303661 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:40518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBWZqj1wV0Si-OkefabQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:50.570982 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:44092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBWv9ocpUE4ed4uDzemwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:51.873530 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:44094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBW3jZBu2q05ozVU9G8gAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:53.158980 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:44110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBXXjZBu2q05ozVU9G8wAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:55.578289 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:44114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBX5qj1wV0Si-OkefabwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:01.877369 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:55458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBZZqj1wV0Si-OkefacAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:03.008275 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBZ5qj1wV0Si-OkefacQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:04.276975 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBaP9ocpUE4ed4uDzenAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:06.623328 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBapqj1wV0Si-OkefadAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:07.907093 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:55492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBaxXjF1vJNtV6CWrqdAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:12.347850 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:55502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBcHjZBu2q05ozVU9G-gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:14.641402 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:36754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBcpqj1wV0Si-OkefaewAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:15.911504 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:36766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBc46lpbStxTqkSktfzQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:18.321086 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:36772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBdo6lpbStxTqkSktfzwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:19.612292 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:36774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBd7ysWC90G-1nBrA2AwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:23.012819 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:54404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBe5qj1wV0Si-OkefafgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:25.303151 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:54420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBfRXjF1vJNtV6CWrqdwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:26.617468 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBftSswJuvopo3lOhRiwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:27.916466 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:54426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBf_9ocpUE4ed4uDzeoAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:29.078301 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:54430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgf9ocpUE4ed4uDzeoQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:30.445345 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:39600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgo6lpbStxTqkSktf0QAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:31.739067 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgwlT9VtDQc7bgUydrwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:33.045474 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:39620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBhXjZBu2q05ozVU9G_gAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:34.314211 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:39636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBhpqj1wV0Si-OkefagQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:36.641483 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:39646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBiJqj1wV0Si-OkefagwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:37.898515 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:39650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBiXbQATo66fKoS7w-3gAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:39.291401 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:39658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBi7ysWC90G-1nBrA2CwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:40.573764 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.243.203:40376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBjBXjF1vJNtV6CWrqewAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:44.110163 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:40382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBkAlT9VtDQc7bgUydswAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:57.209904 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:40390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBnf9ocpUE4ed4uDzetwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:12:21.860789 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:55238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBtbABkC4fWIHEf8HcaQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:12:39.181563 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBx46lpbStxTqkSktf7gAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:12:47.883905 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:36980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBz46lpbStxTqkSktf9gAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:12:53.715092 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:36996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB1f9ocpUE4ed4uDze6AAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:05.345870 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:58586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB4dSswJuvopo3lOhRrwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:08.399063 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:50270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5NSswJuvopo3lOhRsgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:09.403093 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:45646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5bysWC90G-1nBrA2ngAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:09.698925 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:50286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5f9ocpUE4ed4uDze-AAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:21.789978 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.244.31:41134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgB8QlT9VtDQc7bgUydxwAAARg"]
[Mon Mar 16 10:13:25.084119 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:35788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB9dSswJuvopo3lOhRxAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:36.387192 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:43702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCAAlT9VtDQc7bgUyd3QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:41.704535 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:48120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCBXbQATo66fKoS7w-_wAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:48.342128 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:39110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCDI6lpbStxTqkSktgAAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:14:38.769979 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:57286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCPQlT9VtDQc7bgUyd_QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:14:45.412653 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:43242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCRf9ocpUE4ed4uDzfNQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:03.585194 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:57074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCV7ABkC4fWIHEf8HcvAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:14.681872 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:33902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCYhXjF1vJNtV6CWrq7wAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:16.475434 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:53350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZI6lpbStxTqkSktgDQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:17.643480 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:53354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZbABkC4fWIHEf8HcxwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:18.955838 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:45746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZv9ocpUE4ed4uDzfPgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:19.034164 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:39978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZwlT9VtDQc7bgUyeDwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:20.167417 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:45760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCaHjZBu2q05ozVU9HcgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:21.465350 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:45774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCaY6lpbStxTqkSktgDgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:23.669543 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCa7ysWC90G-1nBrA2zAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:25.173044 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:45788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCbRXjF1vJNtV6CWrq8QAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:26.372316 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:45800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCbrABkC4fWIHEf8Hc0QAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:27.578521 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCb5qj1wV0Si-OkefavAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:28.863625 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:53150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCcHbQATo66fKoS7w_JgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:29.159807 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCcXjZBu2q05ozVU9HdgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:30.121810 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:53166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCctSswJuvopo3lOhR3QAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:31.350018 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.241.46:53172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCc3bQATo66fKoS7w_KgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:32.532745 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:53184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdHjZBu2q05ozVU9HeQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:33.899827 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:53190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdY6lpbStxTqkSktgEQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:34.091594 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:48308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdglT9VtDQc7bgUyeFAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:35.091143 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:53198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCd7ysWC90G-1nBrA2zwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:36.538162 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:48322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeBXjF1vJNtV6CWrq-QAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:36.551043 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeLysWC90G-1nBrA22gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:37.899170 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:53212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeZqj1wV0Si-OkefayAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:37.926156 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:48326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCebABkC4fWIHEf8Hc6AAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:39.067280 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:50534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCexXjF1vJNtV6CWrq_AAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:40.470855 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:50540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfJqj1wV0Si-OkefazAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:41.971156 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:50552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfXbQATo66fKoS7w_NwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:43.149279 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:50554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCf3jZBu2q05ozVU9HigAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:43.899119 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:48334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfxXjF1vJNtV6CWrrAQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:44.355457 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:50566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgAlT9VtDQc7bgUyeGAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:45.179377 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:38890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgZqj1wV0Si-Okefa1AAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:45.918581 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:50582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgRXjF1vJNtV6CWrrAgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:46.528468 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:38894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgnbQATo66fKoS7w_OwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:47.091696 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCg3bQATo66fKoS7w_PAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:47.729438 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:38908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCg7ysWC90G-1nBrA23AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:48.399388 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:52106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChHjZBu2q05ozVU9HiwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:49.091298 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChdSswJuvopo3lOhR6wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:49.727323 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:52108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChZqj1wV0Si-Okefa3AAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:50.419541 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:33558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChrysWC90G-1nBrA23wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:50.885157 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:52110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCho6lpbStxTqkSktgIgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:51.759057 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:33566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChwlT9VtDQc7bgUyeHQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:52.323855 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:52116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCiLABkC4fWIHEf8Hc9gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:53.167370 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:33574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCibABkC4fWIHEf8Hc-QAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:53.779417 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:52124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCibABkC4fWIHEf8Hc-wAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:55.471577 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:52126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCi9SswJuvopo3lOhR7wAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:56.815025 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:52140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCjI6lpbStxTqkSktgJgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:58.335570 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:44096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCjv9ocpUE4ed4uDzfUwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:00.604961 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:44100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCkAlT9VtDQc7bgUyeIgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:01.997118 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:44112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCkXjZBu2q05ozVU9HkQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:02.551485 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:33578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCko6lpbStxTqkSktgLQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:04.259337 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:44118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgClP9ocpUE4ed4uDzfVQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:10.070363 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:59710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCmnbQATo66fKoS7w_UwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:13.820113 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:37194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCnbABkC4fWIHEf8HdDAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:15.155018 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:37208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCn46lpbStxTqkSktgLgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:19.591068 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:37218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCowlT9VtDQc7bgUyeKgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:21.471910 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:44132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCpXbQATo66fKoS7w_ZgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:24.775930 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:47504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCqLysWC90G-1nBrA25QAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:26.063349 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:47526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCqpqj1wV0Si-OkefbAAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:27.228696 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCq5qj1wV0Si-OkefbBAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:27.447349 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:47538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCq3jZBu2q05ozVU9HlAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:28.719116 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:42208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCrBXjF1vJNtV6CWrrCQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:29.580674 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:53362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCrQlT9VtDQc7bgUyeLAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:32.036266 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:41742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCsHbQATo66fKoS7w_bAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:36.756645 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:41748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCtHjZBu2q05ozVU9HmAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:39.126478 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:41764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCtxXjF1vJNtV6CWrrEgAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:45.156098 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCvXbQATo66fKoS7w_eAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:45.780149 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:44432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCvXjZBu2q05ozVU9HnwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:49.207471 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:44440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCwbABkC4fWIHEf8HdIAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:51.843592 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCw46lpbStxTqkSktgNAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:53.169982 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:53618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCxRXjF1vJNtV6CWrrHwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:53.187064 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:39000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCxXjZBu2q05ozVU9HpgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:55.604008 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:53628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCx9SswJuvopo3lOhR-gAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:56.946039 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:53644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCyHjZBu2q05ozVU9HqAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:59.274368 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:53660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCy7ABkC4fWIHEf8HdJAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:01.671408 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:40880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCzXbQATo66fKoS7w_ewAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:02.971565 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:40886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCzrABkC4fWIHEf8HdJgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:32.818508 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:40898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC7BXjF1vJNtV6CWrrWQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:34.122573 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:32774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC7njZBu2q05ozVU9HrAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:35.514122 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:32788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC73bQATo66fKoS7w_gQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:47.418940 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:32800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC-7ysWC90G-1nBrA3IwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:48.503294 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:51404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC_LysWC90G-1nBrA3JQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:17:56.230126 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:50990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBP9ocpUE4ed4uDzfeQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:57.550274 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:36874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBf9ocpUE4ed4uDzfewAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:57.750455 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:50176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBf9ocpUE4ed4uDzffAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:58.882266 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:36878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBv9ocpUE4ed4uDzffQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:03.360732 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:49994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDC3jZBu2q05ozVU9HswAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:03.610103 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:38034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDC_9ocpUE4ed4uDzfgwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:06.991089 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:38042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDDpqj1wV0Si-OkefbRAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:23.183116 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDH7ABkC4fWIHEf8HdTgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:24.590159 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:50822] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDIAlT9VtDQc7bgUyeRgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:26.851372 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:50830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDIpqj1wV0Si-OkefbTgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:30.610969 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:50004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDJrABkC4fWIHEf8HdVgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:32.817187 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:42278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDKP9ocpUE4ed4uDzfiQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:34.100285 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:42282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDKrABkC4fWIHEf8HdVwAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:35.325321 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:42296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDK7ABkC4fWIHEf8HdWAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:39.749127 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDL5qj1wV0Si-OkefbVQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:42.107775 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:52692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDMpqj1wV0Si-OkefbVwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:18:47.892714 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:56120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDN9SswJuvopo3lOhSSQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:50.712495 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:52704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDOv9ocpUE4ed4uDzfkQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:55.343186 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:35646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDPwlT9VtDQc7bgUyeUAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:19:43.428693 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:59686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDb7ABkC4fWIHEf8HdjQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:19:44.699662 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:48222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDcHbQATo66fKoS7w_jgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:20:15.526945 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:35648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDjwlT9VtDQc7bgUyelgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:16.840388 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.241.46:48456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDkHbQATo66fKoS7w_mgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:18.009963 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:44330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDkpqj1wV0Si-OkefbaAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:21.487990 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDlf9ocpUE4ed4uDzfoQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:22.777894 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:44350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDlpqj1wV0Si-OkefbaQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:24.061284 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:44354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmAlT9VtDQc7bgUyemAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:25.216351 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:44366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmdSswJuvopo3lOhScAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:26.571158 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:44382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmglT9VtDQc7bgUyemQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:27.764275 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:44384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDm7ABkC4fWIHEf8HdkQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:28.884767 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:56938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDnJqj1wV0Si-OkefbagAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:30.152168 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:56946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDnv9ocpUE4ed4uDzfogAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:32.375407 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:56958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDoBXjF1vJNtV6CWrrnQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:33.680934 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:56972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDoRXjF1vJNtV6CWrrngAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:34.878722 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:56988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDopqj1wV0Si-OkefbawAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:36.065359 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:56998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDpHjZBu2q05ozVU9HyQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:37.416027 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:57000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDpY6lpbStxTqkSktgTgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:38.722892 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:41356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDptSswJuvopo3lOhSfgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:39.880921 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:41360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDp5qj1wV0Si-OkefbbAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:41.181931 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:41376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDqRXjF1vJNtV6CWrrnwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:43.491486 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:41386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDqhXjF1vJNtV6CWrroQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:46.149906 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:41390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDrrABkC4fWIHEf8HdlQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:49.974947 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:35742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDsf9ocpUE4ed4uDzfqAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:51.100018 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:35752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDs_9ocpUE4ed4uDzfqQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:52.415836 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtLABkC4fWIHEf8HdmAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:53.615268 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:35768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtbysWC90G-1nBrA3lAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:54.892518 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:35074] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgDtpqj1wV0Si-OkefbbQAAABg"]
[Mon Mar 16 10:20:54.976333 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:35770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtrABkC4fWIHEf8HdmQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:56.162247 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:35780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDuHjZBu2q05ozVU9HzAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:57.446744 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:35796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDubABkC4fWIHEf8HdmwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:58.629765 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:35920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDurABkC4fWIHEf8HdnQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:59.918543 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:35924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDu7ABkC4fWIHEf8HdngAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:01.006332 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:48226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDvdSswJuvopo3lOhSkQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:01.061708 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:35938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDvQlT9VtDQc7bgUyeoQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:03.542988 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:35946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDv3bQATo66fKoS7w_ogAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:06.323452 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:35960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDwNSswJuvopo3lOhSkgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:07.678248 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:35972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDw46lpbStxTqkSktgUAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:08.852605 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:51314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDxNSswJuvopo3lOhSlAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:11.419257 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:51326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDx3bQATo66fKoS7w_pAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:17.936811 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:51334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDzbysWC90G-1nBrA3ngAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:19.197661 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:57360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDzwlT9VtDQc7bgUyevwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:21.816080 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:34536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD0QlT9VtDQc7bgUyexQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:24.139533 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1I6lpbStxTqkSktgVQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:25.454205 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:36114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1Y6lpbStxTqkSktgVwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:27.894838 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:36124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1rysWC90G-1nBrA3oAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:29.226635 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:36136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD2QlT9VtDQc7bgUyezAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:30.555017 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD2njZBu2q05ozVU9H0QAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:31.862794 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:49894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD27ysWC90G-1nBrA3oQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:33.147082 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD3f9ocpUE4ed4uDzfrwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:35.532132 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD3_9ocpUE4ed4uDzfswAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:36.822042 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD4HjZBu2q05ozVU9H0wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:38.021109 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:49946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD4tSswJuvopo3lOhSlQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:39.326574 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD45qj1wV0Si-OkefbcwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:40.669667 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:57592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5HjZBu2q05ozVU9H1gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:41.851817 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:57598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5QlT9VtDQc7bgUye2QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:42.845399 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:57368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5glT9VtDQc7bgUye2gAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:43.250599 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:57604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD53jZBu2q05ozVU9H1wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:44.421776 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:57614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6LysWC90G-1nBrA3ogAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:45.913818 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:57616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6XbQATo66fKoS7w_pwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:46.155014 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:60912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6pqj1wV0Si-OkefbdwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:47.262843 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:57630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD67ABkC4fWIHEf8HdpwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:48.478364 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:57632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7LABkC4fWIHEf8HdqAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:49.650993 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:57644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7bysWC90G-1nBrA3owAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:50.976802 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:35884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7v9ocpUE4ed4uDzfuQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:52.184147 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:35898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8I6lpbStxTqkSktgWQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:53.483263 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8bABkC4fWIHEf8HdqQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:53.911484 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:60926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8f9ocpUE4ed4uDzfvQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:54.867270 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:35918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8njZBu2q05ozVU9H2AAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:57.652406 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:35016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD9RXjF1vJNtV6CWrr0wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:58.158050 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:35928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD9nbQATo66fKoS7w_rAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:59.463898 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:35934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD95qj1wV0Si-OkefbeQAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:39.722726 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:38688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEH3jZBu2q05ozVU9IAAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:42.119793 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:37888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEIo6lpbStxTqkSktgawAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:22:45.617921 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:54662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEJbysWC90G-1nBrA32QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:22:47.406218 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:37904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEJo6lpbStxTqkSktgdAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:52.911040 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:37322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEK5qj1wV0Si-OkefbjgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:57.323028 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEMXbQATo66fKoS7w_uAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:58.308421 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:37914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEMhXjF1vJNtV6CWrsEAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:23:01.614352 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:37052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgENRXjF1vJNtV6CWrsFgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:23:05.405976 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:46172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEObABkC4fWIHEf8HdtQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:22.930755 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:44454] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgESrABkC4fWIHEf8HdxQAAAEM"]
[Mon Mar 16 10:23:35.504561 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:46176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEV7ABkC4fWIHEf8Hd0QAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:38.807286 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:40930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEWnbQATo66fKoS7w_6AAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:40.091084 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:40944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEXI6lpbStxTqkSktgegAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:01.770123 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:37840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEcQlT9VtDQc7bgUye9QAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:04.148998 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:49762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEdLysWC90G-1nBrA37AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:05.481218 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:49766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEdXjZBu2q05ozVU9ICAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:08.001993 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:49778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEeNSswJuvopo3lOhSsQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:11.399379 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:49780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEe3jZBu2q05ozVU9ICwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:18.416842 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:54254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEgdSswJuvopo3lOhStgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:19.743334 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:54270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEg7ABkC4fWIHEf8Hd1wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:21.071739 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:56430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEhQlT9VtDQc7bgUye9gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:23.410411 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:56442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEhxXjF1vJNtV6CWrsIQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:27.991309 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:56454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEiwlT9VtDQc7bgUye-gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:32.363296 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:56462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEkLABkC4fWIHEf8Hd3AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:44.044776 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:44246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnP9ocpUE4ed4uDzf4AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:46.273110 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:39478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnhXjF1vJNtV6CWrsJgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:47.591956 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:39480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnxXjF1vJNtV6CWrsJwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:25:09.585380 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:39486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEtZqj1wV0Si-OkefcCwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:10.890326 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:49052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEtrABkC4fWIHEf8Hd4gAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:25:16.644168 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:49060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEvLysWC90G-1nBrA3-gAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:17.947376 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:49062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEvdSswJuvopo3lOhSvwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:54.906892 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.228.16:53910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgE4hXjF1vJNtV6CWrsNAAAAc4"]
[Mon Mar 16 10:26:18.670373 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:49076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgE-pqj1wV0Si-OkefcgAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:22.138889 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:47226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgE_tSswJuvopo3lOhSygAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:24.470993 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:48976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFALABkC4fWIHEf8Hd7QAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:25.744236 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:48990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFAY6lpbStxTqkSktgkQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:26.887624 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:48996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFAhXjF1vJNtV6CWrsNgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:34.659798 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFCv9ocpUE4ed4uDzgAAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:40.847126 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:42778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFEP9ocpUE4ed4uDzgCQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:48.670621 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:33178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFGNSswJuvopo3lOhS1QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:53.926990 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:33192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFHbABkC4fWIHEf8Hd9AAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:55.206946 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:47240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFH46lpbStxTqkSktglgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:56.527772 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:47256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIBXjF1vJNtV6CWrsPAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:57.738344 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:47262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIXbQATo66fKoS7xARAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:58.919774 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:47274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIglT9VtDQc7bgUyfgAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:00.072505 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:57428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFJHjZBu2q05ozVU9IMAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:01.240299 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:57442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFJXbQATo66fKoS7xARgAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:22.814632 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:57458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFOtSswJuvopo3lOhS6wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:25.223498 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:53692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPZqj1wV0Si-OkefcwgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:26.524946 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:53704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPhXjF1vJNtV6CWrsSQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:27.739847 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:53712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPxXjF1vJNtV6CWrsSgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:30.325034 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:53722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFQAlT9VtDQc7bgUyfhQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:31.699028 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:60494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFQxXjF1vJNtV6CWrsTAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:32.822202 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:60502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFRI6lpbStxTqkSktgngAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:34.095234 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:60518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFRglT9VtDQc7bgUyfhgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:35.294005 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:60528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFR7ysWC90G-1nBrA4FQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:36.431361 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:60530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFSNSswJuvopo3lOhS7QAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:37.720505 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:60540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFSZqj1wV0Si-OkefcyAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:41.385261 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:60546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFTf9ocpUE4ed4uDzgTQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:42.729670 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:52720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFTnbQATo66fKoS7xAUwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:43.948351 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:52734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFT3jZBu2q05ozVU9IQwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:45.243471 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:52736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFUZqj1wV0Si-OkefcygAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:45.916228 2026] [access_compat:error] [pid 10651:tid 140411590858496] [client 34.82.116.6:49356] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:27:46.535947 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:52742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFUglT9VtDQc7bgUyfiQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:48.992794 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:52748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFVI6lpbStxTqkSktgpAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:50.366223 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:51606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFVnbQATo66fKoS7xAVQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:51.501889 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:51608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFV46lpbStxTqkSktgpQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:52.758671 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:51614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFWI6lpbStxTqkSktgpgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:53.910711 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:51624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFWZqj1wV0Si-OkefcywAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:55.202779 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:51630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFW7ysWC90G-1nBrA4HQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:56.540435 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:51638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFXLysWC90G-1nBrA4HgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:57.859073 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:51648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFXbysWC90G-1nBrA4IAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:59.200435 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:51652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFX5qj1wV0Si-OkefczgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:13.625561 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:52500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFbXjZBu2q05ozVU9IUwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:16.015781 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:41982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcBXjF1vJNtV6CWrsUgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:17.320555 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:41996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcQlT9VtDQc7bgUyfkgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:18.723270 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:41998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcnbQATo66fKoS7xAWAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:22.978046 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:60034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgFdglT9VtDQc7bgUyfmQAAAQs"]
[Mon Mar 16 10:28:26.590356 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:42008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFepqj1wV0Si-Okefc1gAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:27.870790 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:57556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFe9SswJuvopo3lOhS9AAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:30.253651 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:57570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFfv9ocpUE4ed4uDzgZQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:35.386450 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:39280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFg_9ocpUE4ed4uDzgawAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:28:36.340550 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:51922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFhLysWC90G-1nBrA4RAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:28:37.616244 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:56278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFhXbQATo66fKoS7xAWgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:28:44.255139 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:39292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFjI6lpbStxTqkSktgsQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:29:13.583183 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:57894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFqbABkC4fWIHEf8HegQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:29:17.021274 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:59648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFrQlT9VtDQc7bgUyfogAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:15.768913 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:37226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF53jZBu2q05ozVU9IwAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:17.127482 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:39334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6bysWC90G-1nBrA4ZQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:18.404655 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:39486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6v9ocpUE4ed4uDzghwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:19.559298 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:39502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6wlT9VtDQc7bgUyfvQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:20.873688 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:39512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7HjZBu2q05ozVU9IwQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:21.311012 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7bABkC4fWIHEf8HfBgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:23.130880 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:39524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7wlT9VtDQc7bgUyfwQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:23.759540 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:49118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7xXjF1vJNtV6CWrsaQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:24.393343 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:39532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8Jqj1wV0Si-Okefc6wAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:25.680944 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:39548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8Zqj1wV0Si-Okefc7AAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:26.183315 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:49132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8o6lpbStxTqkSktgvgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:26.855457 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:39562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8o6lpbStxTqkSktgvwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:29.237894 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:52074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF9Zqj1wV0Si-Okefc7wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:30.493906 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:52088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF9v9ocpUE4ed4uDzgiQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:31.461447 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:49140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF95qj1wV0Si-Okefc8gAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:31.642539 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:52094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF95qj1wV0Si-Okefc8wAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:32.746187 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:39262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-Jqj1wV0Si-Okefc9wAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:32.907486 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:52108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-Jqj1wV0Si-Okefc-AAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:34.079568 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:52112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-rysWC90G-1nBrA4agAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:35.074611 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:39274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-9SswJuvopo3lOhTBQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:35.317694 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:52122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-_9ocpUE4ed4uDzgigAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:36.474500 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:52132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_HbQATo66fKoS7xAcAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:37.686911 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:52134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_dSswJuvopo3lOhTBgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:38.888007 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.241.46:33128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_hXjF1vJNtV6CWrsbAAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:41.243669 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:33144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGAdSswJuvopo3lOhTCQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:42.542581 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:33148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGAhXjF1vJNtV6CWrsbQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:44.760548 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:33156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBLysWC90G-1nBrA4bQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:44.936467 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:39280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBHjZBu2q05ozVU9IywAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:30:46.032001 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:33168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBpqj1wV0Si-Okefc-wAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:48.231417 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:33172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGCJqj1wV0Si-OkefdAgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:50.821287 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:35584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGCv9ocpUE4ed4uDzgjgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:52.146952 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:35594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGDHjZBu2q05ozVU9IzAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:53.288720 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:35596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGDQlT9VtDQc7bgUyfxgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:55.994017 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.228.16:56114] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgGD46lpbStxTqkSktgxQAAAlY"]
[Mon Mar 16 10:30:58.399145 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:42864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGEpqj1wV0Si-OkefdCgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:58.760916 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:35608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGEtSswJuvopo3lOhTEAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:00.108782 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:36114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFHjZBu2q05ozVU9IzwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:00.757938 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:50674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFLysWC90G-1nBrA4dAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:01.287027 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:36116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFf9ocpUE4ed4uDzgkAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:02.643318 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:36124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFhXjF1vJNtV6CWrscQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:08.729057 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:44190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGHJqj1wV0Si-OkefdFgAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:15.512926 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:36140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGI5qj1wV0Si-OkefdHQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:16.837922 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:34300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJNSswJuvopo3lOhTEwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:17.994872 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:54552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJf9ocpUE4ed4uDzgkQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:18.994593 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:44204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJglT9VtDQc7bgUyf2QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:31:20.663833 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:54568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKAlT9VtDQc7bgUyf3AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:21.379592 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:49320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKbysWC90G-1nBrA4eAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:23.350783 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:54580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKwlT9VtDQc7bgUyf4gAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:23.623187 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:49334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKwlT9VtDQc7bgUyf4wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:24.622192 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGLAlT9VtDQc7bgUyf5AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:28.338457 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:54608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMHjZBu2q05ozVU9I1gAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:29.647570 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:54350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMbABkC4fWIHEf8HfQAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:30.847297 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:54354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMnjZBu2q05ozVU9I1wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:35.212625 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:54358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGNwlT9VtDQc7bgUyf8gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:37.554365 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:54372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGOdSswJuvopo3lOhTFgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:42.134884 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:44122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGPpqj1wV0Si-OkefdJAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:42.376459 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:49350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGPglT9VtDQc7bgUyf-wAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:43.409117 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:44130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGP5qj1wV0Si-OkefdJQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:44.602246 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:44144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGQBXjF1vJNtV6CWrseAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:52.351308 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:44154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSLABkC4fWIHEf8HfXAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:53.659135 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:35212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSbysWC90G-1nBrA4hQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:54.843661 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:35214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSrysWC90G-1nBrA4hgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:56.117065 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:35220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGTJqj1wV0Si-OkefdJgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:08.650560 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:60986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGWBXjF1vJNtV6CWrskwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:32:08.752199 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:35222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGWHjZBu2q05ozVU9I6AAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:12.144151 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:32884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXI6lpbStxTqkSktg1gAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:13.067264 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:47606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXY6lpbStxTqkSktg2QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:32:14.583130 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:32892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXrABkC4fWIHEf8HfYQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:16.926862 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:32902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGYJqj1wV0Si-OkefdMQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:21.992466 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:56646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGZLysWC90G-1nBrA4qQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:24.704526 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:56660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGaNSswJuvopo3lOhTHAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:30.331639 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:56670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGbnjZBu2q05ozVU9I8gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:31.606873 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:60084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGb3bQATo66fKoS7xAgQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:32.650581 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:41156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcLysWC90G-1nBrA4vgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:33.798772 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:60092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcRXjF1vJNtV6CWrsmwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:33.959061 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:39040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcbABkC4fWIHEf8HfZgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:35.107383 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:60094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGc46lpbStxTqkSktg3AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:49.458208 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:60100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGgZqj1wV0Si-OkefdQgAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:50.754978 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGgo6lpbStxTqkSktg3QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:53.998705 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:42432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGhbABkC4fWIHEf8HfewAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:15.592813 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:42446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGm3bQATo66fKoS7xAlgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:16.843704 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:45494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGnHjZBu2q05ozVU9I_gAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:18.000294 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:52202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGnZqj1wV0Si-OkefdSgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:21.377026 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:52218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGoRXjF1vJNtV6CWrsqAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:25.040911 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.244.31:37640] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgGpRXjF1vJNtV6CWrsqQAAAdc"]
[Mon Mar 16 10:33:33.983167 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:52224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGrQlT9VtDQc7bgUygFAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:41.308519 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:49626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGtdSswJuvopo3lOhTMwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:55.590531 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:47662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGw7ysWC90G-1nBrA5IAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:59.169666 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:36492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGx5qj1wV0Si-OkefdVgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:07.249175 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:39044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGz7ABkC4fWIHEf8HfwQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:09.665496 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:45552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG0XjZBu2q05ozVU9JBQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:12.119699 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:41664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG1BXjF1vJNtV6CWrsrwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:14.440714 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:41670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG1v9ocpUE4ed4uDzgxwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:16.806610 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:41672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG2P9ocpUE4ed4uDzgywAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:18.091055 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG2tSswJuvopo3lOhTQAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:19.426016 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:41688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG27ysWC90G-1nBrA5PAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:22.993010 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:58900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG3tSswJuvopo3lOhTRgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:26.888641 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG4v9ocpUE4ed4uDzg1wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:28.067722 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:49610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG5P9ocpUE4ed4uDzg2gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:28.202386 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:58904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG5Jqj1wV0Si-OkefdWQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:31.039517 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:55472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG55qj1wV0Si-OkefdWwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:31.721835 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:58916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG53jZBu2q05ozVU9JCAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:34.187630 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:35062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG6nbQATo66fKoS7xAngAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:35.619239 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:55478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG63bQATo66fKoS7xAoAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:36.561338 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:35070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7I6lpbStxTqkSktg8QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:37.908211 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:35082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7XbQATo66fKoS7xAogAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:39.195391 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:35092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7xXjF1vJNtV6CWrstQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:41.499584 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG8RXjF1vJNtV6CWrsuQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:42.195560 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:55484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG8hXjF1vJNtV6CWrsugAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:43.568306 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:33168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG87ABkC4fWIHEf8HfxQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:44.015782 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:59488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9AlT9VtDQc7bgUygHwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:44.743028 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:33176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9I6lpbStxTqkSktg9AAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:46.023927 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:33184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9o6lpbStxTqkSktg9gAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:47.207166 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:33192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG93jZBu2q05ozVU9JDAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:49.591342 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:37510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-HjZBu2q05ozVU9JDQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:50.598982 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:59494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-o6lpbStxTqkSktg_gAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:50.942876 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:37514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-njZBu2q05ozVU9JDwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:52.139363 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:37516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_I6lpbStxTqkSktg_wAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:53.523531 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:37532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_XbQATo66fKoS7xApwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:54.652220 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.241.46:37540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_glT9VtDQc7bgUygIgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:55.145189 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:45800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_7ABkC4fWIHEf8HfzgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:56.935034 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:37546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAP9ocpUE4ed4uDzg3wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:57.504307 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:45810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAXbQATo66fKoS7xAqQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:58.807039 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:45814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAhXjF1vJNtV6CWrsvAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:59.292175 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:43156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHA5qj1wV0Si-OkefdYwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:02.482151 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:43162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHBHjZBu2q05ozVU9JEQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:04.904707 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:43176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHCHjZBu2q05ozVU9JEwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:06.233662 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHCnjZBu2q05ozVU9JFAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:07.491110 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:43200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHC5qj1wV0Si-OkefdaQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:08.764679 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:35612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHDJqj1wV0Si-OkefdawAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:10.100548 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:35616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHDo6lpbStxTqkSkthCAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:11.255111 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:35622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHD5qj1wV0Si-OkefdbwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:12.558394 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:35626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEHjZBu2q05ozVU9JFQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:13.711326 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:35642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEdSswJuvopo3lOhTbwAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:15.033563 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:35654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEwlT9VtDQc7bgUygKAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:16.201348 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:35670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHFAlT9VtDQc7bgUygKQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:18.511185 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:35674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHFhXjF1vJNtV6CWrsvgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:19.854106 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:41142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHF7ABkC4fWIHEf8Hf0gAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:22.064322 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:41144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHGglT9VtDQc7bgUygKwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:23.407237 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:41150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHGxXjF1vJNtV6CWrsvwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:24.542421 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:41160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHHI6lpbStxTqkSkthCwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:25.875537 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:41170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHHQlT9VtDQc7bgUygLAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:28.132619 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:41182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHIP9ocpUE4ed4uDzg4gAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:32.699536 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:38656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHJLABkC4fWIHEf8Hf1gAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:34.031053 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:38660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHJnbQATo66fKoS7xArwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:37.338418 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:38674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHKRXjF1vJNtV6CWrsxQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:38.577909 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:47698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHKtSswJuvopo3lOhThQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:47.673860 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHMwlT9VtDQc7bgUygOAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:51.080289 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:45040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHN3bQATo66fKoS7xAtQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:35:56.020835 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:45042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHO3bQATo66fKoS7xAuQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:57.030365 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:45822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHPZqj1wV0Si-OkefdmwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:35:57.278088 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.228.16:55762] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgHPbysWC90G-1nBrA5fwAAAYM"]
[Mon Mar 16 10:36:01.441061 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:38178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHQXjZBu2q05ozVU9JHwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:04.692549 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:45058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHRAlT9VtDQc7bgUygQwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:07.044596 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:37490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHR3jZBu2q05ozVU9JIgAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:08.374169 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:50408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSHjZBu2q05ozVU9JIwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:09.198845 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:37754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSRXjF1vJNtV6CWrszwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:10.583566 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:50424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSv9ocpUE4ed4uDzg6QAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:10.585833 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:37986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSo6lpbStxTqkSkthEAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:12.915637 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:50428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHTLABkC4fWIHEf8Hf4QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:13.955084 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:38002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHTbABkC4fWIHEf8Hf4gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:15.300285 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:50436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHT3jZBu2q05ozVU9JKQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:16.608903 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:50448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHUHjZBu2q05ozVU9JKwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:18.990384 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:38008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHUnjZBu2q05ozVU9JLQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:24.644927 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:47446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHWAlT9VtDQc7bgUygSwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:32.758921 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:50462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHYP9ocpUE4ed4uDzg_QAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:34.037110 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:41500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHYnjZBu2q05ozVU9JMAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:38.685019 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHZv9ocpUE4ed4uDzhAwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:38.772155 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:41510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHZtSswJuvopo3lOhTqwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:40.064525 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:33194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHaHjZBu2q05ozVU9JMgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:44.631695 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.241.46:37810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHbBXjF1vJNtV6CWrs1wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:47.891669 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:58650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHb_9ocpUE4ed4uDzhCgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:49.390491 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:37820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHcQlT9VtDQc7bgUygTwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:52.989655 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:57276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHdHjZBu2q05ozVU9JNwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:53.927222 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:58662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHddSswJuvopo3lOhTsgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:54.373951 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:57282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHdhXjF1vJNtV6CWrs3QAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:03.188219 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHf5qj1wV0Si-OkefdrAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:05.610466 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:36272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHgXjZBu2q05ozVU9JOwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:09.150935 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHhRXjF1vJNtV6CWrs5AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:11.538935 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:57296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHhrysWC90G-1nBrA5ngAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:21.377439 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:52186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHkf9ocpUE4ed4uDzhIAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:38.335086 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:51206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHov9ocpUE4ed4uDzhPQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:40.179411 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHo7ysWC90G-1nBrA5nwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:41.502335 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:53470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHpbysWC90G-1nBrA5oQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:44.324055 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:44514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqP9ocpUE4ed4uDzhQQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:45.653278 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:53474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqRXjF1vJNtV6CWrs6gAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:46.703797 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:34144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqrABkC4fWIHEf8HgBQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:48.263428 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHrLABkC4fWIHEf8HgBgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:54.386189 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:34158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHsnjZBu2q05ozVU9JSQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:38:09.923447 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:60744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHwbABkC4fWIHEf8HgGgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:38:11.252610 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:58568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHw7ysWC90G-1nBrA5qQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:13.425050 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:58580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHxZqj1wV0Si-OkefdxAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:38:25.348788 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.244.31:35428] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgH0f9ocpUE4ed4uDzhVAAAAhU"]
[Mon Mar 16 10:38:41.100191 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:53486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH4XbQATo66fKoS7xBEAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:42.430071 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:39418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH4o6lpbStxTqkSkthggAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:43.640542 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:39428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH47ysWC90G-1nBrA5rAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:40:13.564971 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:55572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIPdSswJuvopo3lOhT0QAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:40:58.678699 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.228.16:45018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgIanjZBu2q05ozVU9JkgAAAUo"]
[Mon Mar 16 10:42:18.189263 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIurABkC4fWIHEf8HgPAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:42:19.536244 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:55822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIu7ysWC90G-1nBrA5wwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:38.246511 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:32824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIzhXjF1vJNtV6CWrtEAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:46.387326 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:43120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI1tSswJuvopo3lOhT4wAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:59.054187 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:43136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI4xXjF1vJNtV6CWrtJAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:00.391422 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:45286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI5P9ocpUE4ed4uDziAgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:25.115308 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:42946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_bysWC90G-1nBrA5_gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:43:26.172609 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:45296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_nbQATo66fKoS7xBUQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:27.531126 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:44258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_3bQATo66fKoS7xBUwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:29.750365 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:47002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJARXjF1vJNtV6CWrtKQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:43:36.768584 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:36784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCHbQATo66fKoS7xBYQAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:38.056243 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCglT9VtDQc7bgUyhEQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:39.209059 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCwlT9VtDQc7bgUyhEgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:39.944188 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:38102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJC3bQATo66fKoS7xBaAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:43:40.528086 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:50212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJDAlT9VtDQc7bgUyhFQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:41.711244 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:50222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJDY6lpbStxTqkSktiDgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:03.081256 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:50228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJI3jZBu2q05ozVU9J-AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:04.425796 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:50610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJJNSswJuvopo3lOhT8gAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:11.235392 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:50626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJK5qj1wV0Si-OkeffAwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:13.555215 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:56650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJLZqj1wV0Si-OkeffCQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:14.899802 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:56656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJLglT9VtDQc7bgUyhHwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:16.039137 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:56666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJMLysWC90G-1nBrA6DAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:23.516950 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJN_9ocpUE4ed4uDziFQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:24.886999 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:36574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJONSswJuvopo3lOhT9wAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:28.123519 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJPNSswJuvopo3lOhT_AAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:30.890354 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:57396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJPo6lpbStxTqkSktiPgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:32.173000 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:33422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQHjZBu2q05ozVU9J_wAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:33.273016 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQQlT9VtDQc7bgUyhJAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:34.549302 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:33424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQnjZBu2q05ozVU9KAgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:34.567475 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:36376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQnjZBu2q05ozVU9KAwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:36.911367 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJRHjZBu2q05ozVU9KBwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:23.509908 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:36386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJc3jZBu2q05ozVU9KOAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:34.133403 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:54534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJff9ocpUE4ed4uDziLwAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:36.655321 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:34732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJf_9ocpUE4ed4uDziMQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:41.453430 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:51150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJhbysWC90G-1nBrA6LgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:02.234554 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.228.16:52090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgJmv9ocpUE4ed4uDziNgAAAgo"]
[Mon Mar 16 10:46:09.353254 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:51154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJoXbQATo66fKoS7xCFQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:10.666992 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:33590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJoglT9VtDQc7bgUyhTwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:16.758871 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:33596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJqNSswJuvopo3lOhUKgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:18.114503 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:44316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJqglT9VtDQc7bgUyhUAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:19.293698 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:44328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJq_9ocpUE4ed4uDziOAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:20.045221 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrHbQATo66fKoS7xCKQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:46:21.337293 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:35038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrRXjF1vJNtV6CWrtVwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:21.737972 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:44336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrQlT9VtDQc7bgUyhVQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:23.111653 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:44352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJr7ysWC90G-1nBrA6NQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:27.365332 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:35042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJs3jZBu2q05ozVU9KWQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:46:33.487177 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:35048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJuY6lpbStxTqkSktidQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:45.570469 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:43850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJxf9ocpUE4ed4uDziRQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:47:16.416981 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:52572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ5BXjF1vJNtV6CWrtdgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:25.550898 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:38988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ7f9ocpUE4ed4uDziWAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:34.091680 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:44358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ9o6lpbStxTqkSktiqwAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:38.719493 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ-v9ocpUE4ed4uDziXgAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:40.018712 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:36598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ_P9ocpUE4ed4uDziXwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:42.306511 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:36602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ_o6lpbStxTqkSktirQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:44.659307 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:36606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKAI6lpbStxTqkSktirwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:11.064768 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:36610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKGxXjF1vJNtV6CWrtkwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:18.419789 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:34494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKInbQATo66fKoS7xCngAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:27.812232 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.244.31:33398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgKK46lpbStxTqkSktitgAAAkM"]
[Mon Mar 16 10:49:04.195303 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKTrABkC4fWIHEf8HgwAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:49:05.563175 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:50796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKUZqj1wV0Si-OkeffegAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:49:23.907616 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:43548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKY_9ocpUE4ed4uDzirgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:30.199814 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:52558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKarABkC4fWIHEf8Hg0AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:40.225697 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:50812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKdNSswJuvopo3lOhUwAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:44.751823 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:33928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKeBXjF1vJNtV6CWrtoQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:49:50.259595 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:33932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKfrysWC90G-1nBrA6UQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:30.239825 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:50974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKprABkC4fWIHEf8HhBgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:31.599562 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKpwlT9VtDQc7bgUyhowAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:35.019913 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:35018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKq7ysWC90G-1nBrA6WQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:36.338718 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:35032] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKrLABkC4fWIHEf8HhCQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:47.187815 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:35036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKt9SswJuvopo3lOhUzwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:49.790535 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:56744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKuY6lpbStxTqkSktiyQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:51:02.295720 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.228.16:48200] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgKxrysWC90G-1nBrA6XwAAAYw"]
[Mon Mar 16 10:53:30.390352 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.244.31:33636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgLWrysWC90G-1nBrA6cAAAAZQ"]
[Mon Mar 16 10:54:50.057293 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:44036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLqnbQATo66fKoS7xDYgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:54:53.447592 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:34936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLrXbQATo66fKoS7xDZQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:54:54.766198 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:34950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLro6lpbStxTqkSktjTgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:55:15.925175 2026] [access_compat:error] [pid 10772:tid 140411716749056] [client 65.111.2.55:10455] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:16.869171 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 65.111.2.55:29997] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:17.846463 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 65.111.2.55:13393] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:25.426812 2026] [access_compat:error] [pid 32654:tid 140411708356352] [client 104.207.54.41:47161] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:26.318934 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 104.207.54.41:62447] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:27.194016 2026] [access_compat:error] [pid 32654:tid 140411641214720] [client 104.207.54.41:32785] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:56:06.456237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:42018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgL9Jqj1wV0Si-OkefgiQAAAA4"]
[Mon Mar 16 10:57:32.530588 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:50166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMTHbQATo66fKoS7xDnwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:57:33.795051 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:47680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMTXjZBu2q05ozVU9LWQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:12.570185 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:40806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMdHjZBu2q05ozVU9LhAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:13.859162 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:57738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMdXbQATo66fKoS7xDpwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:15.903837 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:57740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMd3bQATo66fKoS7xDqAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:17.243795 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:57750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMeXbQATo66fKoS7xDqgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:18.464980 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:57758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMerABkC4fWIHEf8HhbQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:19.707935 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMe_9ocpUE4ed4uDzi8QAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:21.215954 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:33082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMfY6lpbStxTqkSktjYwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:22.389270 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:33094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMfv9ocpUE4ed4uDzi8gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:23.671051 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:33106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMf46lpbStxTqkSktjZAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:24.844703 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:33116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMgLysWC90G-1nBrA6kwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:27.132240 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:33124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMg7ysWC90G-1nBrA6lQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:30.660631 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgMhpqj1wV0Si-Okefg2wAAAAs"]
[Mon Mar 16 10:58:31.918058 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:33128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMhwlT9VtDQc7bgUyjEwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:34.245333 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:60994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMirysWC90G-1nBrA6lwAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:35.550924 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMi9SswJuvopo3lOhV4gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:36.722507 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:60998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMjLysWC90G-1nBrA6mAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:39.160317 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:32780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMj_9ocpUE4ed4uDzi-QAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:41.551802 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:57490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMkf9ocpUE4ed4uDzi_QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:08.894155 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:57504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMrBXjF1vJNtV6CWrt_QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:10.270924 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:32878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMrv9ocpUE4ed4uDzjGQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:13.890414 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:32894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMsXbQATo66fKoS7xDsAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:15.187894 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:32908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMs3bQATo66fKoS7xDsQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:21.947185 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:32912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMuY6lpbStxTqkSktjcAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:24.514222 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:44622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMvLABkC4fWIHEf8HhsAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:26.917117 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:44632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMvglT9VtDQc7bgUyjGgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:28.310520 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:44648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMwAlT9VtDQc7bgUyjGwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:34.003099 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:39804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMxnbQATo66fKoS7xDuQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:36.298041 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:44650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMyAlT9VtDQc7bgUyjIwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:37.611424 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:39696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMyXbQATo66fKoS7xDugAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:44.750294 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM0BXjF1vJNtV6CWruBQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:51.142932 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:46340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM13jZBu2q05ozVU9LjwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:52.465921 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:52034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM2NSswJuvopo3lOhV7gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:53.803366 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:52040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM2XbQATo66fKoS7xDvwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:03.839707 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM446lpbStxTqkSktjfQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:05.209475 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:55126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM5bABkC4fWIHEf8HhzQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:06.487883 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:55136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM5pqj1wV0Si-Okefg5QAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:08.850694 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM6Jqj1wV0Si-Okefg5wAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:12.343330 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:55162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7Jqj1wV0Si-Okefg6wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:13.626679 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:56494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7QlT9VtDQc7bgUyjJwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:14.927539 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:56504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7tSswJuvopo3lOhV8AAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:17.188870 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:56518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM8XbQATo66fKoS7xDxAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:18.502586 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:56526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM8hXjF1vJNtV6CWruCQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:21.191627 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:56542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9bABkC4fWIHEf8Hh3wAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:22.508993 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:41676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9rysWC90G-1nBrA6pQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:23.849857 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:41690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9xXjF1vJNtV6CWruCgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:29.058462 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:41702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM_NSswJuvopo3lOhV9QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:30.387264 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:33376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM_nbQATo66fKoS7xDxgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:32.774413 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:33390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNAP9ocpUE4ed4uDzjYwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:34.076070 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNAo6lpbStxTqkSktjfgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:35.372181 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNA5qj1wV0Si-Okefg8AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:36.714177 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:33412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNBHbQATo66fKoS7xDxwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:41.997432 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:33418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNCRXjF1vJNtV6CWruEQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:44.282361 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:33422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNDAlT9VtDQc7bgUyjLgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:45.607656 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNDZqj1wV0Si-Okefg8wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:49.881690 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:33450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNEdSswJuvopo3lOhV-gAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:51.196549 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:46668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNEwlT9VtDQc7bgUyjNwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:58.897544 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:46684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNGrysWC90G-1nBrA6sAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:02.793814 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:46686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNHtSswJuvopo3lOhWAAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:04.133553 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:46670] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgNIAlT9VtDQc7bgUyjQgAAAQQ"]
[Mon Mar 16 11:01:07.193684 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:59640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNI3bQATo66fKoS7xDzgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:12.696073 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:59656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNKAlT9VtDQc7bgUyjSwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:16.165319 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:36876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNLHbQATo66fKoS7xD2AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:18.657462 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:36886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNLrysWC90G-1nBrA6swAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:19.984027 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:36898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNL7ABkC4fWIHEf8HiEgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:21.285813 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:41836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNMXjZBu2q05ozVU9LlgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:24.628762 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNNNSswJuvopo3lOhWBgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:27.030916 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:41862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNNwlT9VtDQc7bgUyjXgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:28.339390 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:41874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNOHbQATo66fKoS7xD2gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:32.928801 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:41888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNPP9ocpUE4ed4uDzjdAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:34.216377 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:35968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNPnjZBu2q05ozVU9LmAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:36.616961 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:35978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNQI6lpbStxTqkSktjhQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:37.956145 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:35992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNQdSswJuvopo3lOhWCAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:40.254015 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:36006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNRAlT9VtDQc7bgUyjagAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:42.043089 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:55058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNRRXjF1vJNtV6CWruFgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:43.393948 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:55070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNR3jZBu2q05ozVU9LmgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:46.762257 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:55080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNSnjZBu2q05ozVU9LnQAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:51.474689 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:55088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNTwlT9VtDQc7bgUyjegAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:02:00.952079 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:58318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNVxXjF1vJNtV6CWruHQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:02:08.918907 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:34130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNYLysWC90G-1nBrA6wwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:02:14.441134 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:40482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNZnbQATo66fKoS7xEDAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:22.618518 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 193.233.126.116:34002] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 11:02:26.431572 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:40488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNchXjF1vJNtV6CWruLwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:29.876871 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:34476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNdRXjF1vJNtV6CWruNQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:32.396607 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:51076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNeJqj1wV0Si-OkefhDAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:33.740654 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:51090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNebABkC4fWIHEf8HiKgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:35.055005 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNe7ysWC90G-1nBrA6xgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:37.310110 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:51104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNfLysWC90G-1nBrA6xwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:38.669331 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:51114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNfhXjF1vJNtV6CWruOwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:39.943326 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNf3bQATo66fKoS7xEJgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:41.178209 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:46734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgQlT9VtDQc7bgUyjrQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:42.472257 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:46746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgglT9VtDQc7bgUyjrwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:43.728741 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:46752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgwlT9VtDQc7bgUyjswAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:45.043718 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:46768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhQlT9VtDQc7bgUyjuAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:46.410237 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:46770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhglT9VtDQc7bgUyjvQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:47.663495 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:46786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhxXjF1vJNtV6CWruPAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:48.938304 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:46792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNiHbQATo66fKoS7xELwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:50.106221 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:39148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNirABkC4fWIHEf8HiMAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:51.413795 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:39160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNi5qj1wV0Si-OkefhDgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:52.707585 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:39164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNjHjZBu2q05ozVU9LrwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:54.017912 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:39178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNjrysWC90G-1nBrA6yAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:56.390108 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:39184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkLABkC4fWIHEf8HiMgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:57.663695 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:39186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkQlT9VtDQc7bgUyjyQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:58.822195 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:39192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkglT9VtDQc7bgUyjzAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:00.129304 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:39204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlJqj1wV0Si-OkefhFwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:01.430797 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:48550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlZqj1wV0Si-OkefhGAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:02.724790 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:48554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlhXjF1vJNtV6CWruPQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:04.024692 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:48564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmP9ocpUE4ed4uDzjgQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:05.349428 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:48580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmXjZBu2q05ozVU9LsAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:06.699570 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:48588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmv9ocpUE4ed4uDzjhAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:07.900597 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:48596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNm7ABkC4fWIHEf8HiNAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:09.084959 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:48600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNnbysWC90G-1nBrA6ygAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:10.406031 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:49794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNno6lpbStxTqkSktjkwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:11.691453 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:49800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNn3jZBu2q05ozVU9LsQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:13.038818 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:49814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNoXjZBu2q05ozVU9LswAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:14.354759 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:49820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNoglT9VtDQc7bgUyj1gAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:15.534860 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:49830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNowlT9VtDQc7bgUyj2gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:16.867361 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:49838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNpP9ocpUE4ed4uDzjhwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:20.529097 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNqBXjF1vJNtV6CWruTgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:32.105388 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:38812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNtJqj1wV0Si-OkefhLgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:03:32.506894 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:50666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgNtLABkC4fWIHEf8HiOgAAAEs"]
[Mon Mar 16 11:03:43.945057 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:52538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNv_9ocpUE4ed4uDzjnwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:45.232520 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:48412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNwbysWC90G-1nBrA6zwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:03:58.945394 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:48424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNzglT9VtDQc7bgUyj8AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:04:33.808863 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgN8QlT9VtDQc7bgUykDgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:04:40.639310 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgN-LysWC90G-1nBrA63wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:04:50.099267 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:56210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOAnbQATo66fKoS7xEbwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:05:29.615942 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:55500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOKY6lpbStxTqkSktjzgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:06:04.893195 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.228.16:32780] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgOTLABkC4fWIHEf8HiUAAAAEc"]
[Mon Mar 16 11:06:53.556877 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:58418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOfXbQATo66fKoS7xE0gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:04.879434 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:33850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOiBXjF1vJNtV6CWrudwAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:08.321659 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:32788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOjHjZBu2q05ozVU9L5gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:12.900113 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:44522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOkP9ocpUE4ed4uDzkfAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:34.415598 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:44532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOpglT9VtDQc7bgUykQgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:40.952076 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:49220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOrJqj1wV0Si-OkefhZwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:42.344292 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:60218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOrnbQATo66fKoS7xE3AAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:08:10.742988 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:45950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOyo6lpbStxTqkSktkNwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:32.972984 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.244.31:45700] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgO4HjZBu2q05ozVU9MKwAAAUo"]
[Mon Mar 16 11:08:50.721917 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:60222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO8o6lpbStxTqkSktkYQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:52.023572 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:43538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9Jqj1wV0Si-OkefhagAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:53.301418 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:43546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9RXjF1vJNtV6CWruiwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:54.435834 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:43552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9njZBu2q05ozVU9MRQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:55.722806 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:43560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO93bQATo66fKoS7xFEAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:56.863708 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:43566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO-AlT9VtDQc7bgUykSgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:59.122993 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:43574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO-nbQATo66fKoS7xFEwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:00.168950 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:39082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_HbQATo66fKoS7xFFQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:00.470721 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:53380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_AlT9VtDQc7bgUykTQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:01.799108 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:53384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_XbQATo66fKoS7xFFwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:03.092894 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:53394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO__9ocpUE4ed4uDzkkwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:04.427380 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:53396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPANSswJuvopo3lOhWvQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:05.700294 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:38160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAbysWC90G-1nBrA7YAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:05.716568 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:53402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAf9ocpUE4ed4uDzklAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:07.084549 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:53412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAwlT9VtDQc7bgUykUQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:08.439398 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:53414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBNSswJuvopo3lOhWvgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:09.571925 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:53430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBbysWC90G-1nBrA7YQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:10.838502 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:35052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBglT9VtDQc7bgUykVgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:12.184928 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:35064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCAlT9VtDQc7bgUykWQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:12.707466 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:38172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCAlT9VtDQc7bgUykWgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:13.475686 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:35072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCQlT9VtDQc7bgUykWwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:14.778597 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:35076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPChXjF1vJNtV6CWrujAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:16.081803 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:35088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDLABkC4fWIHEf8HieAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:17.422575 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:35104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDbysWC90G-1nBrA7ZwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:18.778877 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:35120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDhXjF1vJNtV6CWrujQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:19.520542 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:55248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPD7ysWC90G-1nBrA7agAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:20.075356 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:35124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPELysWC90G-1nBrA7awAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:20.570647 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:40696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPELysWC90G-1nBrA7bAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:22.224309 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:40702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPErABkC4fWIHEf8HieQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:23.769562 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:40718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPExXjF1vJNtV6CWrujgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:25.048785 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:49948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFf9ocpUE4ed4uDzkmQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:25.279368 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:40724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFdSswJuvopo3lOhWwAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:26.822643 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:40726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFnbQATo66fKoS7xFGgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:28.372932 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:40736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPGHjZBu2q05ozVU9MYwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:29.960639 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:40740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPGXjZBu2q05ozVU9MaAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:31.432532 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:45526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPG3jZBu2q05ozVU9MawAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:33.796117 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:49960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPHXjZBu2q05ozVU9McAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:34.320009 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:45536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPHhXjF1vJNtV6CWrukQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:36.083479 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:45548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPII6lpbStxTqkSktkZQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:37.588947 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:45556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPIXjZBu2q05ozVU9MdAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:39.054898 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:45566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPI7ABkC4fWIHEf8HifAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:40.475548 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:51498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJAlT9VtDQc7bgUykXwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:41.955411 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:51514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJQlT9VtDQc7bgUykYAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:43.470383 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:51526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJ_9ocpUE4ed4uDzkmwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:45.749961 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:51528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPKdSswJuvopo3lOhWwgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:47.422367 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:51532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPKwlT9VtDQc7bgUykYQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:48.636006 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:58574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLBXjF1vJNtV6CWruoAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:48.731670 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:51546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLHjZBu2q05ozVU9MfQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:49.996356 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:51560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLXjZBu2q05ozVU9MgQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:51.439942 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:49824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPL3jZBu2q05ozVU9MhAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:52.755224 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:49832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPMLysWC90G-1nBrA7bwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:54.126448 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:49840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPMnjZBu2q05ozVU9MiQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:55.403446 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPM5qj1wV0Si-OkefhcAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:56.758068 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:49868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPNHbQATo66fKoS7xFHQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:58.041399 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:49870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPNrysWC90G-1nBrA7cAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:59.395220 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:49880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPN3jZBu2q05ozVU9MlQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:00.733383 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:57284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPOJqj1wV0Si-OkefhcQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:02.547221 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:57294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPOo6lpbStxTqkSktkawAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:03.895525 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:57304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPO_9ocpUE4ed4uDzkngAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:05.222694 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:57306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPPdSswJuvopo3lOhWxQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:07.649362 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:57318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPP7ysWC90G-1nBrA7cgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:09.180250 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:57324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQdSswJuvopo3lOhWxgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:10.349864 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQhXjF1vJNtV6CWruogAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:11.684207 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:51912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQ3bQATo66fKoS7xFIgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:11.820109 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:37716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQ3jZBu2q05ozVU9MqgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:12.956440 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:51914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPRLysWC90G-1nBrA7dAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:14.268985 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:51928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPRtSswJuvopo3lOhWxwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:15.622376 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:51940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPR7ABkC4fWIHEf8HifgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:16.931368 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:51942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPSLysWC90G-1nBrA7dgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:18.092575 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:51958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPShXjF1vJNtV6CWrupAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:30.671690 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPVnjZBu2q05ozVU9MyQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:34.063486 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:53352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPWhXjF1vJNtV6CWruqQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:42.434949 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPYZqj1wV0Si-OkefhlQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:54.436899 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:34660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPbpqj1wV0Si-OkefhrgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:10:58.924214 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:55152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPcnbQATo66fKoS7xFKgAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:11:01.633345 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:49078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPdJqj1wV0Si-OkefhtAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:12.735291 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:51806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPgJqj1wV0Si-OkefhzwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:16.230291 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:49092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPhJqj1wV0Si-Okefh0wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:18.227156 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:46942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPhtSswJuvopo3lOhW1AAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:25.789270 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:41962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPjbysWC90G-1nBrA7gQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:26.358511 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:43348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPjo6lpbStxTqkSktkfgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:48.622333 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:57684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPpP9ocpUE4ed4uDzktwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:10.392045 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:36240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPuhXjF1vJNtV6CWruywAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:12:18.295145 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:49804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPwnjZBu2q05ozVU9NJgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:19.690897 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:49814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPw3bQATo66fKoS7xFYQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:26.576421 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:40372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPypqj1wV0Si-OkefiDAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:12:32.087094 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:43358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP0HbQATo66fKoS7xFbgAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:33.448904 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:40384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP0XjZBu2q05ozVU9NLQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:12:39.229366 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:54180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP1wlT9VtDQc7bgUykhQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:35.941238 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQDwlT9VtDQc7bgUykyAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:36.326119 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:52384] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgQELABkC4fWIHEf8HijgAAAEI"]
[Mon Mar 16 11:13:37.232326 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:58854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQEZqj1wV0Si-OkefikAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:37.671204 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:37700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQEZqj1wV0Si-OkefikgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:38.971755 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:43974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQErABkC4fWIHEf8HikQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:50.728192 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:43986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQHrABkC4fWIHEf8HinAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:56.378524 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:58856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQJNSswJuvopo3lOhW7wAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:14:00.592904 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:40780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQKJqj1wV0Si-OkefirwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:04.127497 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:32796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQLBXjF1vJNtV6CWru0QAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:07.669651 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:32802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQL46lpbStxTqkSktkjAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:53.250635 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:44990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQXZqj1wV0Si-Okefi4gAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:04.459720 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:39924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQaLysWC90G-1nBrA7wwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:13.235560 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:60992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQcXjZBu2q05ozVU9NTAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:14.529851 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:34444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQcnbQATo66fKoS7xFhAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:15.821195 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQc3jZBu2q05ozVU9NTgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:15:18.044145 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.241.46:55786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQdnbQATo66fKoS7xFiAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:22.658612 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:55354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQeglT9VtDQc7bgUyk2AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:32.467874 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:55356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQhLABkC4fWIHEf8HirgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:35.274888 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:39158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQhxXjF1vJNtV6CWru4QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:37.687561 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:39172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQibABkC4fWIHEf8HisAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:15:39.005479 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:53420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQi5qj1wV0Si-Okefi6wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:40.271610 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:53430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQjHbQATo66fKoS7xFiQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:51.163955 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:53442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQl7ysWC90G-1nBrA7zQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:58.665685 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:34470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQnnjZBu2q05ozVU9NdwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:00.912081 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:52526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQoBXjF1vJNtV6CWru5AAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:04.339933 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:40476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQowlT9VtDQc7bgUyk7QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:09.353059 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:51202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQp9SswJuvopo3lOhW-wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:09.357474 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:38492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQqI6lpbStxTqkSktklgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:12.904013 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:40796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQrLysWC90G-1nBrA71gAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 11:16:18.300942 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:58298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQsnbQATo66fKoS7xFlAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:20.039119 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:58302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQsxXjF1vJNtV6CWrvFQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:21.398582 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:49884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQtXjZBu2q05ozVU9NegAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:22.683219 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:49894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQtrABkC4fWIHEf8HitAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:23.845639 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQt3jZBu2q05ozVU9NewAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:25.154319 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:49908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQuQlT9VtDQc7bgUylIAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:26.437603 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQuv9ocpUE4ed4uDzlSgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:28.660997 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:49922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvI6lpbStxTqkSktkmQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:29.961397 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:49938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvZqj1wV0Si-Okefi8gAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:31.408399 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:40812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvhXjF1vJNtV6CWrvIAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:42.962058 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:39128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQynjZBu2q05ozVU9NhwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:44.271842 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:54320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQzJqj1wV0Si-Okefi9gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:46.383114 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:54322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQzbABkC4fWIHEf8HiuwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:47.673627 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:54330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQz3jZBu2q05ozVU9NiAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:48.960314 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:54332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ0Jqj1wV0Si-Okefi-AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:50.283360 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:33742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ0hXjF1vJNtV6CWrvJQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:51.514048 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:33758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ07ABkC4fWIHEf8HivAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:52.781443 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:33766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ1P9ocpUE4ed4uDzlTgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:55.426429 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:33774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ1glT9VtDQc7bgUylTQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:56.769498 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:33790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ2AlT9VtDQc7bgUylUgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:58.031328 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ2nbQATo66fKoS7xFmwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:59.329702 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ27ABkC4fWIHEf8HivQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:00.673243 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:38406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ3P9ocpUE4ed4uDzlUwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:02.006989 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ3pqj1wV0Si-Okefi-gAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:03.408491 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:38436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ33bQATo66fKoS7xFnQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:04.723431 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:38452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ4I6lpbStxTqkSktkoQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:05.987323 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:38458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ4RXjF1vJNtV6CWrvJgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:07.375908 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:38464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ49SswJuvopo3lOhXDQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:08.573347 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:38472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ5LysWC90G-1nBrA8BAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:09.871036 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:38478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ5XbQATo66fKoS7xFnwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:11.167001 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:48922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ53bQATo66fKoS7xFoQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:12.442794 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:48924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6LABkC4fWIHEf8HiwwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:13.758978 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:48926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6XjZBu2q05ozVU9NjgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:15.047322 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:48940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6xXjF1vJNtV6CWrvKAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:16.149777 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:48942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7I6lpbStxTqkSktkowAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:17.546020 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:48946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7bABkC4fWIHEf8HixAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:18.826908 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:48950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7pqj1wV0Si-Okefi_wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:21.159377 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:53592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ8P9ocpUE4ed4uDzlVgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:22.496967 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:53604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ8rABkC4fWIHEf8HixQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:23.771179 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ83jZBu2q05ozVU9NjwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:25.081087 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:53626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9Zqj1wV0Si-OkefjAAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:26.375672 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:53636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9glT9VtDQc7bgUyldwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:27.686189 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:53640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9wlT9VtDQc7bgUylegAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:28.993220 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:53654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-AlT9VtDQc7bgUylfAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:30.280524 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:53030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-pqj1wV0Si-OkefjAQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:31.602817 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-3bQATo66fKoS7xFqAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:32.769215 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:53038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_LABkC4fWIHEf8HixwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:34.059309 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:53046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_rABkC4fWIHEf8HiyAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:35.039223 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.241.46:51076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_wlT9VtDQc7bgUyliAAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:17:35.336167 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:53052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_46lpbStxTqkSktkpAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:36.599357 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:53056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRALABkC4fWIHEf8HiygAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:37.928011 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:53070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRARXjF1vJNtV6CWrvLAAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:39.211182 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:53080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRA3jZBu2q05ozVU9NkgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:40.510827 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:58184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRBI6lpbStxTqkSktkpQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:41.846398 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:58198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRBbABkC4fWIHEf8HiywAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:43.140770 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:58210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRB_9ocpUE4ed4uDzlYAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:43.297248 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:45854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRB_9ocpUE4ed4uDzlYQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:17:44.416868 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:58218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRCJqj1wV0Si-OkefjAwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:45.752215 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:58232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRCXjZBu2q05ozVU9NlAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:47.699513 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:44336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRC3bQATo66fKoS7xFrgAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:17:48.124088 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:58244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDI6lpbStxTqkSktkqQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:49.423130 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:58246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDRXjF1vJNtV6CWrvLgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:50.737032 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:59432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDglT9VtDQc7bgUyliQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:53.269949 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:59442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgREHjZBu2q05ozVU9NlQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:54.598205 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:59454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRErABkC4fWIHEf8HizAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:55.716943 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:59460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgREwlT9VtDQc7bgUyligAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:56.006382 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:59460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFAlT9VtDQc7bgUyliwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:56.387856 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:33452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFI6lpbStxTqkSktksAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:17:57.294570 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:59472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFZqj1wV0Si-OkefjBgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:58.611049 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:59474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFtSswJuvopo3lOhXFQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:59.939694 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFwlT9VtDQc7bgUyljAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:01.206521 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:51286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGXbQATo66fKoS7xFsAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:02.623260 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:51296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGhXjF1vJNtV6CWrvMQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:03.816179 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:51310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGxXjF1vJNtV6CWrvMgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:05.143934 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:51316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHXjZBu2q05ozVU9NlwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:06.408746 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:51322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHhXjF1vJNtV6CWrvMwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:07.704785 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:51332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHwlT9VtDQc7bgUyljgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:09.039316 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:51340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRIbABkC4fWIHEf8Hi2QAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:10.361177 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:53170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRInjZBu2q05ozVU9NmAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:11.622636 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:53174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRI5qj1wV0Si-OkefjBwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:12.826363 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:53190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJAlT9VtDQc7bgUylkAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:14.167373 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:53200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJglT9VtDQc7bgUylkgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:15.382064 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:53214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJ46lpbStxTqkSktksQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:16.673934 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:53228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRKNSswJuvopo3lOhXGwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:17.983006 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:53238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRKXbQATo66fKoS7xFswAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:19.129308 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:53244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRK7ABkC4fWIHEf8Hi4wAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:20.333654 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:58252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLLABkC4fWIHEf8Hi5gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:21.633584 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:58260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLQlT9VtDQc7bgUyllQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:22.924659 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:58270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLglT9VtDQc7bgUyllwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:24.225883 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:58276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMAlT9VtDQc7bgUylmAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:25.610870 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:33458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMbABkC4fWIHEf8Hi6gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:18:27.630719 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:58284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMwlT9VtDQc7bgUylmwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:18:50.318385 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:56524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRSo6lpbStxTqkSktkyAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:18:53.704884 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:44352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRTbysWC90G-1nBrA8PwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:23.319224 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:44356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRa3bQATo66fKoS7xF0QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:28.144585 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:58298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRcNSswJuvopo3lOhXiAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:36.350909 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgReLABkC4fWIHEf8Hi8wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:19:37.744889 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:44252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgReQlT9VtDQc7bgUylqgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:40.779979 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:44432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRfI6lpbStxTqkSktk0AAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:44.095120 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:42434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRgAlT9VtDQc7bgUylrQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:45.564894 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRgQlT9VtDQc7bgUylrgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:19:57.224146 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:42444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRjXjZBu2q05ozVU9N1wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:02.959675 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:57518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRkv9ocpUE4ed4uDzleQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:12.776743 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:44354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRnAlT9VtDQc7bgUyltQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:15.403728 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:48168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRn5qj1wV0Si-OkefjIQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:17.756862 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:48174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRoY6lpbStxTqkSktk1AAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:24.113342 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:56714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRqHjZBu2q05ozVU9N9QAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:36.340889 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:51040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRtLysWC90G-1nBrA8YgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:37.664036 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:40438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRtRXjF1vJNtV6CWrvRAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:20:48.778537 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:45448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwLABkC4fWIHEf8HjCAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:20:49.969853 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:42894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwQlT9VtDQc7bgUylugAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:20:51.091448 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:42898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwwlT9VtDQc7bgUyluwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:21:15.180428 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:47304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgR2XjZBu2q05ozVU9N9wAAAUQ"]
[Mon Mar 16 11:23:39.142029 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.244.31:55968] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgSa_9ocpUE4ed4uDzl2QAAAhI"]
[Mon Mar 16 11:24:03.685555 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:60034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSg3jZBu2q05ozVU9OTgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:04.961909 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:36754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgShAlT9VtDQc7bgUymOAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:06.143881 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:36764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgShrysWC90G-1nBrA81QAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:07.394721 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:36780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSh3bQATo66fKoS7xF-gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:16.411149 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:33652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSkHjZBu2q05ozVU9OVgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:53.655199 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgStbABkC4fWIHEf8HjSQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:26:16.149584 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:41384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgTCHjZBu2q05ozVU9OZQAAAUE"]
[Mon Mar 16 11:27:29.168052 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:34702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTUQlT9VtDQc7bgUymjgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:30.498827 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:45710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTUo6lpbStxTqkSktlaQAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:31.640695 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTU_9ocpUE4ed4uDznHgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:32.917080 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:45722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTVJqj1wV0Si-Okefj1gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:34.206098 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:45730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTVnbQATo66fKoS7xGHgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:35.308723 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:45742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTV46lpbStxTqkSktlagAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:36.523242 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:45750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWNSswJuvopo3lOhX6QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:37.834454 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:45754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWbABkC4fWIHEf8HjWAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:39.147411 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:37276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWwlT9VtDQc7bgUymmAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:40.300344 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:37280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXJqj1wV0Si-Okefj2QAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:41.650067 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:37288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXQlT9VtDQc7bgUymmwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:42.841871 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:37300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXpqj1wV0Si-Okefj2wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:43.115704 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:37300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTX5qj1wV0Si-Okefj3QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:44.427854 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:37308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTYP9ocpUE4ed4uDznKwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:50.181406 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:37318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTZpqj1wV0Si-Okefj4gAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:51.413279 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:57356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTZwlT9VtDQc7bgUympwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:52.615898 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:57370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTaLABkC4fWIHEf8HjXQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:53.933678 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTaQlT9VtDQc7bgUymqwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:55.087263 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:57384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTawlT9VtDQc7bgUymrQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:56.379281 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:57398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbAlT9VtDQc7bgUymrwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:57.561116 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:57410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbZqj1wV0Si-Okefj4wAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:58.924673 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:60154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbrABkC4fWIHEf8HjXgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:00.066666 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:60166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTcJqj1wV0Si-Okefj5QAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:03.858644 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:60174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTc7ABkC4fWIHEf8HjYQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:05.142619 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:60184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTdbABkC4fWIHEf8HjZAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:06.322129 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:60186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTdrysWC90G-1nBrA88gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:07.603043 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:60202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTd9SswJuvopo3lOhX7QAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:08.833980 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:47188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTeLysWC90G-1nBrA88wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:10.067356 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:47200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTetSswJuvopo3lOhX7wAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:11.359870 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:47202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTexXjF1vJNtV6CWrvyQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:12.514844 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:47204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTfBXjF1vJNtV6CWrvygAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:13.702133 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:47208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTfZqj1wV0Si-Okefj6AAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:14.889815 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:47218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTftSswJuvopo3lOhX8AAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:16.206092 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:47234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgBXjF1vJNtV6CWrvywAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:17.376083 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:47246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgbysWC90G-1nBrA89AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:18.551442 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:55858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgtSswJuvopo3lOhX8QAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:30.493515 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:50394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTjo6lpbStxTqkSktlggAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:31.847824 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTj3jZBu2q05ozVU9OgwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:33.173695 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:58922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTkXjZBu2q05ozVU9OhgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:34.482639 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:58930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTkglT9VtDQc7bgUym0gAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:35.776673 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:58932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTk7ABkC4fWIHEf8HjaAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:37.066689 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:58936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTlZqj1wV0Si-Okefj7QAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:39.255741 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:58946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTlglT9VtDQc7bgUym2QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:40.567057 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:48722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmBXjF1vJNtV6CWrvzQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:41.659482 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmf9ocpUE4ed4uDznRAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:42.985096 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:48738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmnbQATo66fKoS7xGJAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:44.187375 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:48752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnAlT9VtDQc7bgUym4AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:44.238852 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:36668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgTnLABkC4fWIHEf8HjawAAAEs"]
[Mon Mar 16 11:28:45.520779 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:48756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnRXjF1vJNtV6CWrvzwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:46.860701 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:48772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnhXjF1vJNtV6CWrv0QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:48.176921 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:48788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgToHjZBu2q05ozVU9OlAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:49.475171 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:48796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTobysWC90G-1nBrA89wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:50.988110 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:48914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTorysWC90G-1nBrA8-QAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:52.262940 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:48926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTpI6lpbStxTqkSktlhgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:53.549438 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:48930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTpZqj1wV0Si-Okefj8QAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:54.906532 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:48946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTptSswJuvopo3lOhX9gAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:57.247469 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:48956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTqXbQATo66fKoS7xGKQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:58.556467 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:48962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTqtSswJuvopo3lOhX9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:59.888363 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:48968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTq7ABkC4fWIHEf8HjbAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:01.136364 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:37078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTrRXjF1vJNtV6CWrv0wAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:02.284817 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:37090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTrhXjF1vJNtV6CWrv1AAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:03.627602 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:37106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTr7ysWC90G-1nBrA8-gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:04.901106 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:37114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTsHjZBu2q05ozVU9OpQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:06.132259 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 185.177.72.22:44514] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 11:29:06.187272 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:37128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTsrysWC90G-1nBrA8_AAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:07.499371 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:37136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTs5qj1wV0Si-Okefj9gAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:08.854239 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:37142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTtJqj1wV0Si-Okefj9wAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:10.872486 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:38130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTtpqj1wV0Si-Okefj-QAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:12.166823 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:38144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTuJqj1wV0Si-Okefj-gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:13.484907 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:38150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTuQlT9VtDQc7bgUym8gAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:14.781511 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:38156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTutSswJuvopo3lOhX-QAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:15.906105 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:38170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTu3bQATo66fKoS7xGLQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:17.185938 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:38178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTvRXjF1vJNtV6CWrv1gAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:19.513417 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:38180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTv7ABkC4fWIHEf8HjcgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:20.810603 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTwI6lpbStxTqkSktljgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:21.991838 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:53144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTwY6lpbStxTqkSktljwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:23.319412 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTw46lpbStxTqkSktlkQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:24.496569 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:53152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxP9ocpUE4ed4uDznWQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:25.766312 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:53154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxXbQATo66fKoS7xGLwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:26.895278 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:53166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxv9ocpUE4ed4uDznXQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:28.163119 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:53168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTyJqj1wV0Si-Okefj_AAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:29.458999 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTybABkC4fWIHEf8HjcwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:30.635771 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:37016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTytSswJuvopo3lOhYAAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:31.933526 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:37018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTywlT9VtDQc7bgUym_QAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:33.208707 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:37026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTzZqj1wV0Si-OkefkAAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:36.030784 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:37032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTzwlT9VtDQc7bgUynAAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:37.291479 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:37044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT0QlT9VtDQc7bgUynAgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:39.647900 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:37058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT07ysWC90G-1nBrA9BAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:40.983075 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:50866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT1Jqj1wV0Si-OkefkBAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:42.194384 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:50876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT1nbQATo66fKoS7xGOAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:44.415756 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:55860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2HjZBu2q05ozVU9OzgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:29:45.731137 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:34926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2QlT9VtDQc7bgUynBQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:29:45.904961 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:50892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2QlT9VtDQc7bgUynBgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:47.177845 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:50900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT25qj1wV0Si-OkefkBwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:48.322683 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:50904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3NSswJuvopo3lOhYAgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:49.635078 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:50910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3bABkC4fWIHEf8HjdwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:50.911700 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3rysWC90G-1nBrA9BwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:53.331218 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:56390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT4QlT9VtDQc7bgUynCAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:54.754932 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:56406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT4tSswJuvopo3lOhYAwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:55.919632 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:56408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT47ysWC90G-1nBrA9CAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:57.215818 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:56412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT5QlT9VtDQc7bgUynCQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:59.551172 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:56416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT57ysWC90G-1nBrA9CwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:00.882582 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:39420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT6NSswJuvopo3lOhYBwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:05.747154 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:39432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT7QlT9VtDQc7bgUynDwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:07.079780 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:39434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT75qj1wV0Si-OkefkHgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:08.397556 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:39444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT8Jqj1wV0Si-OkefkJAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:09.742993 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:39454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT8bABkC4fWIHEf8HjewAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:11.051081 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:52120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT85qj1wV0Si-OkefkKgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:13.326319 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT9dSswJuvopo3lOhYCwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:14.613388 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:52130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT9o6lpbStxTqkSktlmwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:15.972461 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:52146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT99SswJuvopo3lOhYDAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:17.387146 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:52150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-f9ocpUE4ed4uDznjAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:19.743167 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:52156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-wlT9VtDQc7bgUynEQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:19.783755 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:34930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-5qj1wV0Si-OkefkMwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:21.028510 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:42590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT_XjZBu2q05ozVU9O0gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:21.119614 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT_bABkC4fWIHEf8HjfQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:29.115241 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:42602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUBRXjF1vJNtV6CWrv8AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:30.430581 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:54682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUBtSswJuvopo3lOhYDQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:33.963914 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:54684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUCZqj1wV0Si-OkefkNwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:41.753067 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUEXjZBu2q05ozVU9O6wAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:42.798380 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:39988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUEnjZBu2q05ozVU9O7QAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:44.222541 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:33402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUFLABkC4fWIHEf8HjgAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:30:55.217488 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:36472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUH7ysWC90G-1nBrA9HQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:57.252394 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUIXbQATo66fKoS7xGWAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:00.625136 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:44676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJJqj1wV0Si-OkefkQQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:01.023325 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:46974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJQlT9VtDQc7bgUynJgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:03.007446 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:44682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJ_9ocpUE4ed4uDznvQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:05.535116 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:44692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUKQlT9VtDQc7bgUynLAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:06.869587 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:44708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUKpqj1wV0Si-OkefkQwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:10.240889 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:33644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgULpqj1wV0Si-OkefkRgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:11.516320 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:33656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgULwlT9VtDQc7bgUynNAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:16.622837 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.228.16:48078] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgUNAlT9VtDQc7bgUynNwAAAQI"]
[Mon Mar 16 11:31:17.287235 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUNZqj1wV0Si-OkefkTQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:19.684485 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:53960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUN9SswJuvopo3lOhYFwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:41.224376 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:53974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUTbABkC4fWIHEf8HjoAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:50.204328 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:59332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUVglT9VtDQc7bgUynSgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:54.183459 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:40840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUWnbQATo66fKoS7xGcQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:56.252121 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUW7ABkC4fWIHEf8HjpQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:39.410096 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:40852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUhv9ocpUE4ed4uDzoBQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:53.543345 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:44050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUlbysWC90G-1nBrA98AAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:56.994604 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:42806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUmAlT9VtDQc7bgUynXwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:04.703382 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:56008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUoHjZBu2q05ozVU9PDgAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:07.304753 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:56024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUo3bQATo66fKoS7xGgQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:12.829650 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:37970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUqHjZBu2q05ozVU9PFwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:16.223017 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:37976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUrHjZBu2q05ozVU9PGwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:31.415277 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:37992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUu3bQATo66fKoS7xGowAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:37.065154 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:40792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUwY6lpbStxTqkSktlxgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:47.065844 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:49506] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgUy46lpbStxTqkSktlyQAAAlI"]
[Mon Mar 16 11:33:51.385572 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUz7ysWC90G-1nBrA-HQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:52.683693 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:58332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU0Jqj1wV0Si-OkefkmwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:07.007808 2026] [access_compat:error] [pid 10831:tid 140411582465792] [client 185.177.72.22:50268] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 11:34:13.887311 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:58346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU5f9ocpUE4ed4uDzoJgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:21.591379 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:60794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU7RXjF1vJNtV6CWrwIwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:24.728098 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:46406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU8AlT9VtDQc7bgUyncQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:29.110981 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:46412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU9bABkC4fWIHEf8Hj7wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:43.321882 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:59312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVA7ysWC90G-1nBrA-OAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:44.639553 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:43930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVBNSswJuvopo3lOhYSQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:05.163667 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:43942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVGbysWC90G-1nBrA-TwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:06.447475 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:59224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVGhXjF1vJNtV6CWrwLgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:35:10.982910 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:59232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVHtSswJuvopo3lOhYUQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:24.242702 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:50804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVLP9ocpUE4ed4uDzoRQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:35:25.566907 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:35504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVLXjZBu2q05ozVU9PRAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:33.291437 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:35508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVNXbQATo66fKoS7xHDAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:39.999744 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:49074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVOxXjF1vJNtV6CWrwRQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:47.195300 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:39904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVQ_9ocpUE4ed4uDzoUgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:09.365111 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:48330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVWY6lpbStxTqkSktmAwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:17.943249 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:59704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVYbysWC90G-1nBrA-cwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:36:19.263181 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVY46lpbStxTqkSktmCAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:19.362580 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:42044] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgVY46lpbStxTqkSktmCQAAAlQ"]
[Mon Mar 16 11:36:20.432070 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:42852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVZNSswJuvopo3lOhYawAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:23.827542 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:42866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVZwlT9VtDQc7bgUynlQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:25.084089 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:42876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVadSswJuvopo3lOhYbAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:27.447086 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:42878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVa3jZBu2q05ozVU9PWwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:36:35.294108 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:37952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVc7ysWC90G-1nBrA-fgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:47.181245 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:37962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVf_9ocpUE4ed4uDzocwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:58.649871 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:52362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgViglT9VtDQc7bgUynqQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:10.846980 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:42556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVlv9ocpUE4ed4uDzogwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:12.220953 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:50914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVmHjZBu2q05ozVU9PcgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:16.662173 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVnNSswJuvopo3lOhYgAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:20.097672 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:50938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVoHjZBu2q05ozVU9PdgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:21.467267 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:52188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVoXbQATo66fKoS7xHNQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:29.944987 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:52192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVqRXjF1vJNtV6CWrwqwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:36.610434 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:45580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVsJqj1wV0Si-OkefljQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:37.966788 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:45584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVsdSswJuvopo3lOhYiQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:42.579863 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:46878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVtrysWC90G-1nBrA-lwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:38:36.243112 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 185.177.72.22:55704] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 11:38:43.022248 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:46890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgV8wlT9VtDQc7bgUyoMAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:38:48.300203 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.244.31:37942] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgV-BXjF1vJNtV6CWrwyAAAAdg"]
[Mon Mar 16 11:39:06.962950 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:41818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWCo6lpbStxTqkSktmUAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:09.322929 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:49244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWDXjZBu2q05ozVU9PwQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:17.772708 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWFQlT9VtDQc7bgUyoOQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:19.519779 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:52204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWF3bQATo66fKoS7xHXAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:22.255634 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:52216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWGhXjF1vJNtV6CWrw1AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:38.864596 2026] [access_compat:error] [pid 10709:tid 140411632822016] [client 185.177.72.22:57090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 11:39:54.329598 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:52218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWOpqj1wV0Si-Okefl3gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:40:22.878813 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:46948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWVnjZBu2q05ozVU9QGAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:40:24.241079 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:40162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWWAlT9VtDQc7bgUyoXAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:41:09.929545 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWhXjZBu2q05ozVU9QXgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:41:20.169832 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:34870] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgWkJqj1wV0Si-OkefmMwAAAA4"]
[Mon Mar 16 11:41:20.894982 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:59904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWkNSswJuvopo3lOhYyQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:42:08.615759 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:46414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWwLysWC90G-1nBrA_AgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:42:11.043513 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:33594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWw46lpbStxTqkSktmkQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:42:45.664145 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:33604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgW5RXjF1vJNtV6CWrxHAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:45:33.348486 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:49198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgXjBXjF1vJNtV6CWrxcwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:46:21.146048 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.228.16:55982] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgXvf9ocpUE4ed4uDzpOgAAAgo"]
[Mon Mar 16 11:47:43.315164 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:34124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgYD3jZBu2q05ozVU9RxwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:48:49.958197 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.244.31:46388] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgYUI6lpbStxTqkSktnUQAAAkE"]
[Mon Mar 16 11:49:55.939906 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:45246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgYkwlT9VtDQc7bgUyqEgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 11:51:21.890943 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.228.16:44500] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgY6f9ocpUE4ed4uDzpkAAAAhU"]
[Mon Mar 16 11:53:49.563225 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:45444] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgZfdSswJuvopo3lOhZYAAAAIw"]
[Mon Mar 16 11:56:25.010811 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:44754] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgaGZqj1wV0Si-OkefoCQAAAAU"]
[Mon Mar 16 11:56:45.786873 2026] [mime_magic:error] [pid 21806:tid 140411590858496] (70014)End of file found: [client 74.7.243.203:57806] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root
[Mon Mar 16 11:58:34.789237 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:42496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgamrABkC4fWIHEf8HmpQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:58:49.441142 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:43842] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgaqXbQATo66fKoS7xKoAAAAMM"]
[Mon Mar 16 12:01:25.619167 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:39778] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgbRXjZBu2q05ozVU9TbgAAAVM"]
[Mon Mar 16 12:02:08.682856 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:45054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbcAlT9VtDQc7bgUysOAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:10.010264 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:36266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbcrABkC4fWIHEf8HnJQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:11.228172 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbc9SswJuvopo3lOhaWAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:12.428311 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:34532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbdHjZBu2q05ozVU9ThQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:13.602632 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:34538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbddSswJuvopo3lOhaWgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:15.975159 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbd5qj1wV0Si-OkefpBQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:17.501014 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:34560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbeXjZBu2q05ozVU9TiAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:18.808160 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:34562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbetSswJuvopo3lOhaXQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:19.995803 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:34566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbewlT9VtDQc7bgUysOwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:22.359874 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:59908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbfhXjF1vJNtV6CWry5wAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:24.743133 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:59922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbf_9ocpUE4ed4uDzqSwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:26.090904 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:59926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbgv9ocpUE4ed4uDzqTgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:27.243532 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:59932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbgwlT9VtDQc7bgUysPgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:28.630339 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:59946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbhJqj1wV0Si-OkefpEAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:29.851179 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:59948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbhQlT9VtDQc7bgUysQQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:33.303343 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:41786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbif9ocpUE4ed4uDzqUQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:34.582052 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:41802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbinbQATo66fKoS7xLEwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:35.731119 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbi9SswJuvopo3lOhaXwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:37.026559 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:41824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbjbABkC4fWIHEf8HnPgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:39.475191 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:41832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbj7ysWC90G-1nBrBBvwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:41.000037 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:45484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbkBXjF1vJNtV6CWry7wAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:42.659062 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:45492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbkrysWC90G-1nBrBBwwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:44.139642 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:45498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblJqj1wV0Si-OkefpGgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:45.411758 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:45502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblZqj1wV0Si-OkefpGwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:46.775016 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblrABkC4fWIHEf8HnQAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:48.104999 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:45522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmLABkC4fWIHEf8HnQgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:49.292221 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:45528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmf9ocpUE4ed4uDzqXAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:50.670447 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:47996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmtSswJuvopo3lOhaYgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:51.967038 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:48006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbm46lpbStxTqkSkto0AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:55.519543 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:48014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbn5qj1wV0Si-OkefpHgAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:56.803264 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:48020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgboLysWC90G-1nBrBByQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:58.181097 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:48028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgborysWC90G-1nBrBBygAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:03.215830 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:48044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbp5qj1wV0Si-OkefpJAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:04.627055 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:43708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqNSswJuvopo3lOhaZgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:05.931396 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:43720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqbysWC90G-1nBrBBzAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:07.097505 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:43732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqxXjF1vJNtV6CWry9gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:09.465151 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:43744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbrdSswJuvopo3lOhaawAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:10.823885 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:33756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbrnbQATo66fKoS7xLIQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:12.153604 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:33760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbsLABkC4fWIHEf8HnSwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:26.299536 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:33776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbvtSswJuvopo3lOhaewAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:03:28.628266 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbwBXjF1vJNtV6CWry-QAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:03:31.151457 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:33820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbw7ysWC90G-1nBrBBzwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:51.071199 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.244.31:52386] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgb146lpbStxTqkSktpDAAAAk4"]
[Mon Mar 16 12:03:51.696304 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:39904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb17ysWC90G-1nBrBB4gAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:53.018313 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:37582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb2Y6lpbStxTqkSktpDwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:56.304954 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:37588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb3LysWC90G-1nBrBB5QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:00.987579 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:37602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb4HbQATo66fKoS7xLLAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:02.281444 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:52534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb4pqj1wV0Si-OkefpLAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:03.556969 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:52536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb45qj1wV0Si-OkefpLQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:04.907098 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:52538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb5Jqj1wV0Si-OkefpLwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:06.071082 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb5o6lpbStxTqkSktpJwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:07.434956 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:52566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb57ABkC4fWIHEf8HnTwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:08.601820 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:52572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb6HbQATo66fKoS7xLLQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:11.163502 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb6xXjF1vJNtV6CWrzAAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:18.153122 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:35760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb8glT9VtDQc7bgUysYQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:38.632104 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:35766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcBv9ocpUE4ed4uDzq0wAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:49.855604 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:41008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcEbABkC4fWIHEf8HnYQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:00.390707 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:38110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcHLysWC90G-1nBrBCAgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:03.793278 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:39808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcH7ysWC90G-1nBrBCCAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:07.253403 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:39824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcIwlT9VtDQc7bgUysbQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:19.267590 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:39830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcLxXjF1vJNtV6CWrzDwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:23.855138 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:44274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcMwlT9VtDQc7bgUyseAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:27.189179 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:44278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcN3bQATo66fKoS7xLaQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:32.982801 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:44290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcPLABkC4fWIHEf8HnZwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:35.346149 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:45266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcPwlT9VtDQc7bgUysfQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:36.642166 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:45278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcQI6lpbStxTqkSktpQAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:26.912275 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:54128] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgccrABkC4fWIHEf8HnbAAAAE4"]
[Mon Mar 16 12:06:30.775026 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:45288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcdnbQATo66fKoS7xLzQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:42.283574 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:41830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcgnbQATo66fKoS7xL2AAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:48.218628 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:55524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgciJqj1wV0Si-OkefpSgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:49.657007 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:55526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgciQlT9VtDQc7bgUyshwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:51.998344 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:38602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgci9SswJuvopo3lOhapQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:53.359199 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:38612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcjXjZBu2q05ozVU9TrwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:54.685925 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:38616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcjnbQATo66fKoS7xL2wAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:58.032828 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:38628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgckrABkC4fWIHEf8HncAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:02.523006 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:38642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgclv9ocpUE4ed4uDzq-QAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:04.940297 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:35816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcmP9ocpUE4ed4uDzq_AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:06.227299 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:35828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcmpqj1wV0Si-OkefpSwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:07.416378 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcm7ABkC4fWIHEf8HndQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:12.145826 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:35852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcoAlT9VtDQc7bgUysjQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:14.439061 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:45336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcopqj1wV0Si-OkefpUQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:15.758971 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:45348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcowlT9VtDQc7bgUysjgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:16.919961 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:45352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpJqj1wV0Si-OkefpUwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:18.249097 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:45356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpglT9VtDQc7bgUyskAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:19.434979 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:45360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpwlT9VtDQc7bgUyskgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:22.797956 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:46292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcqo6lpbStxTqkSktpVAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:30.611985 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:46308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcsrABkC4fWIHEf8HngAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:31.935704 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:51702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcsxXjF1vJNtV6CWrzJAAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:37.352960 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:51718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcuY6lpbStxTqkSktpYAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:39.963196 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:51732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcu9SswJuvopo3lOha1gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:41.290623 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:41964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcvXjZBu2q05ozVU9T3gAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:47.980597 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:41976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcwwlT9VtDQc7bgUysowAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:49.239977 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcxbysWC90G-1nBrBCagAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:51.863983 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:58814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcx3bQATo66fKoS7xL5QAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:12.343841 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:58824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc23jZBu2q05ozVU9UDAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:16.626120 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:47494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc4HjZBu2q05ozVU9UEwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:24.743206 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:47506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc6AlT9VtDQc7bgUysqwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:26.089823 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:37806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc6rABkC4fWIHEf8HngQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:28.275114 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:37816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7HbQATo66fKoS7xL6gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:29.554945 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7bABkC4fWIHEf8HnggAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:30.835123 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:33466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7rysWC90G-1nBrBCbwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:32.955710 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:33474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc8BXjF1vJNtV6CWrzMAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:37.457095 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:33486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc9Y6lpbStxTqkSktpaQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:38.747443 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:33492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc9nbQATo66fKoS7xL7AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:40.215366 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:37588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc-Jqj1wV0Si-OkefpZgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:44.429949 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:37602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc_BXjF1vJNtV6CWrzMwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:48.056141 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:37606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdAI6lpbStxTqkSktpbgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:49.433360 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:37612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdAQlT9VtDQc7bgUysrwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:50.682526 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:40000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdArysWC90G-1nBrBCdAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:53.282947 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:48114] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgdBdSswJuvopo3lOha_wAAAJM"]
[Mon Mar 16 12:08:59.695791 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:40008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdC9SswJuvopo3lOhbBAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:03.137661 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:43724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdD_9ocpUE4ed4uDzrCwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:08.635903 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:43726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdFJqj1wV0Si-OkefpkAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:24.528802 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:43734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdJLysWC90G-1nBrBCgwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:25.820181 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:59454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdJRXjF1vJNtV6CWrzOAAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:28.080273 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdKNSswJuvopo3lOhbBwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:29.357814 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:59478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdKXjZBu2q05ozVU9USgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:36.999104 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:54510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdMNSswJuvopo3lOhbEQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:38.303608 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:54514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdMpqj1wV0Si-OkefprQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:39.582530 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:54524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdM_9ocpUE4ed4uDzrEgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:40.799288 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:44578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdNHjZBu2q05ozVU9UTAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:43.111990 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:44580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdN7ysWC90G-1nBrBChgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:47.554895 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.243.203:44592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdOxXjF1vJNtV6CWrzPgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:53.012507 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQXbQATo66fKoS7xMAAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:53.380612 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 193.24.211.48:45312] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:09:54.272954 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:52874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQnbQATo66fKoS7xMAQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:55.426469 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:52878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQ5qj1wV0Si-OkefpwAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:56.686499 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:52882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdRHjZBu2q05ozVU9UTgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:01.003320 2026] [access_compat:error] [pid 32654:tid 140411733534464] [client 193.24.211.48:45326] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:01.092828 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:52890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdSbABkC4fWIHEf8HnjgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:05.707310 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:47562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdTRXjF1vJNtV6CWrzQQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:08.054536 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:47578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdUAlT9VtDQc7bgUys-QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:09.607859 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 104.207.40.64:14159] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:10.495093 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:47584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdUo6lpbStxTqkSktpdAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:18.462542 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:55530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdWrABkC4fWIHEf8HnlgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:20.795117 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdXJqj1wV0Si-Okefp2gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:24.822165 2026] [access_compat:error] [pid 10772:tid 140411683178240] [client 104.207.62.33:36827] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:27.364109 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 216.26.250.153:28729] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:30.703234 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:60544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdZo6lpbStxTqkSktpfQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:39.416857 2026] [access_compat:error] [pid 10709:tid 140411540502272] [client 65.111.1.57:62685] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:42.682279 2026] [access_compat:error] [pid 21946:tid 140411683178240] [client 209.50.166.6:59485] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:49.254068 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 209.50.186.27:21809] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:56.059513 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 104.207.35.143:28901] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:11:08.842823 2026] [access_compat:error] [pid 21805:tid 140411557287680] [client 104.207.59.113:18535] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:13:54.382773 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.244.31:44626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgeMv9ocpUE4ed4uDzrnwAAAgY"]
[Mon Mar 16 12:16:10.419070 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:45260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeunjZBu2q05ozVU9VLQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:17.643301 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:37742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgewZqj1wV0Si-OkefqMAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:18.908501 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:37750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgewpqj1wV0Si-OkefqMwAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:20.227007 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:39472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexP9ocpUE4ed4uDzrsQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:21.409388 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:39474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexZqj1wV0Si-OkefqOAAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:22.600963 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:39478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexv9ocpUE4ed4uDzrswAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:23.755794 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:39492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexxXjF1vJNtV6CWrzcQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:26.238203 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:39508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeyrABkC4fWIHEf8HoHgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:27.506055 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:39520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeywlT9VtDQc7bgUyt-gAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:30.952776 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:39524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgezpqj1wV0Si-OkefqQwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:32.261894 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:34204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge0Jqj1wV0Si-OkefqRwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:33.433855 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:34210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge0Zqj1wV0Si-OkefqSgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:35.843559 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge05qj1wV0Si-OkefqTwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:37.135098 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:34238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge1bysWC90G-1nBrBCvwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:38.467227 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:34250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge1pqj1wV0Si-OkefqUgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:39.768775 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:34262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge13bQATo66fKoS7xMnwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:41.087657 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:33480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge2f9ocpUE4ed4uDzrtQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:42.454047 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:33482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge2tSswJuvopo3lOhbpQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:02.599264 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:33490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge7nbQATo66fKoS7xMsgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:05.146041 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:42192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge8f9ocpUE4ed4uDzruAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:06.441234 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:42204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge8njZBu2q05ozVU9VMwAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:07.734092 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:42212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge83jZBu2q05ozVU9VNQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:09.064630 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:42228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge9f9ocpUE4ed4uDzrugAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:11.443636 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:32980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge99SswJuvopo3lOhbqgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:12.775591 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:32992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge-I6lpbStxTqkSktqDgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:15.215088 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:32996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge-wlT9VtDQc7bgUyuKgAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:16.456781 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:32998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge_BXjF1vJNtV6CWrzegAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:19.883875 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:33008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge_wlT9VtDQc7bgUyuOAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:24.783355 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:48318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfBAlT9VtDQc7bgUyuQwAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:35.335750 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:48330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfD9SswJuvopo3lOhbtwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:17:38.902323 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:33286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfEnjZBu2q05ozVU9VPgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:19:14.442889 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:38460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfcrABkC4fWIHEf8HojQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:27.263054 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:34306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgff5qj1wV0Si-OkefqywAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:37.685281 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:45188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfibABkC4fWIHEf8HolQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:56.831378 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:54214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfnAlT9VtDQc7bgUyujgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:25.958345 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:55224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfuRXjF1vJNtV6CWrzsgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:27.504601 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:54334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfu5qj1wV0Si-Okefq1QAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:35.925472 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:54336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfw3bQATo66fKoS7xNNgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:21:27.867144 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:56850] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgf93bQATo66fKoS7xNPAAAAMU"]
[Mon Mar 16 12:22:18.091447 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:44924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggKnjZBu2q05ozVU9VwwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:22:22.963356 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:35240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggLnjZBu2q05ozVU9VyAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:22:29.700199 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:57034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggNQlT9VtDQc7bgUyuqAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:23:03.695865 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:48326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggVwlT9VtDQc7bgUyuywAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:09.199243 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:60620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggXXjZBu2q05ozVU9V1QAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:11.856246 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggXpqj1wV0Si-OkefrYgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:13.194265 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:37280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggYQlT9VtDQc7bgUyuzgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:14.578269 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:37294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggYnbQATo66fKoS7xNTgAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:15.963707 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:37308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggY3jZBu2q05ozVU9V1gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:17.307733 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:37312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggZf9ocpUE4ed4uDzsTgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:18.476310 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:37320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggZhXjF1vJNtV6CWrzyAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:20.852379 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:37334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggaLABkC4fWIHEf8HoqQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:22.150246 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:34298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggav9ocpUE4ed4uDzsTwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:23.477793 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:34314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgga_9ocpUE4ed4uDzsUQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:25.899505 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:34320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggbf9ocpUE4ed4uDzsVAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:27.169044 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:34330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggb3jZBu2q05ozVU9V1wAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:28.407247 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:34346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggcJqj1wV0Si-OkefrhAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:29.606006 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:34352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggcf9ocpUE4ed4uDzsVwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:30.783511 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:37436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggchXjF1vJNtV6CWrzywAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:32.070962 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:37438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdP9ocpUE4ed4uDzsWQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:33.411518 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:37440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdf9ocpUE4ed4uDzsWwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:34.727077 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdhXjF1vJNtV6CWrzzQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:35.993428 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:37462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggd9SswJuvopo3lOhb3QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:37.318640 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:37476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggedSswJuvopo3lOhb3gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:38.515229 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:37482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggeo6lpbStxTqkSktqQgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:39.953342 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:37494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggewlT9VtDQc7bgUyu0gAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:41.463579 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:35568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggfQlT9VtDQc7bgUyu0wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:42.803881 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:35574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggfpqj1wV0Si-OkefrogAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:44.009359 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:35588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgggAlT9VtDQc7bgUyu1AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:45.323483 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:35594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgggdSswJuvopo3lOhb4AAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:46.689151 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:35604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggghXjF1vJNtV6CWrz0AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:47.975931 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggg3jZBu2q05ozVU9V2wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:49.279701 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:35624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgghbABkC4fWIHEf8HorwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:50.602833 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggho6lpbStxTqkSktqRQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:51.994919 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:43148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggh46lpbStxTqkSktqRgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:53.371328 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:43156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggif9ocpUE4ed4uDzsXwAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:54.747500 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:43162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggirABkC4fWIHEf8HosgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:56.059365 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:43170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggjNSswJuvopo3lOhb4gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:56.093249 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:33276] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abggjLABkC4fWIHEf8HotAAAAE4"]
[Mon Mar 16 12:23:57.408678 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:43180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggjbABkC4fWIHEf8HotQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:59.734342 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggj46lpbStxTqkSktqSwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:01.080093 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:42132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggkQlT9VtDQc7bgUyu1gAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:02.365127 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:42140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggknbQATo66fKoS7xNVgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:03.547083 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:42156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggkwlT9VtDQc7bgUyu2AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:04.821084 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:42162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgglNSswJuvopo3lOhb4wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:06.135945 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.243.203:42178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgglglT9VtDQc7bgUyu2QAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:07.328634 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:42188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggl_9ocpUE4ed4uDzsYAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:08.624459 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:42192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggmAlT9VtDQc7bgUyu2gAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:09.765155 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:42194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggmQlT9VtDQc7bgUyu3AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:11.131773 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:48572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggm_9ocpUE4ed4uDzsYQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:12.319489 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:48580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggnJqj1wV0Si-OkefrxwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:14.038138 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:48582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggnZqj1wV0Si-OkefryAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:15.324198 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:48590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggn9SswJuvopo3lOhb5AAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:16.668752 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:48592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggoBXjF1vJNtV6CWrz1AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:17.981296 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:48596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggoXbQATo66fKoS7xNWQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:19.326018 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:48610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggo7ABkC4fWIHEf8HotgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:20.621571 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:44864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggpJqj1wV0Si-OkefrzwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:21.867092 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:44874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggpY6lpbStxTqkSktqYQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:23.005639 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:44880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggp3jZBu2q05ozVU9V3wAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:24.275577 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:44892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggqAlT9VtDQc7bgUyu4AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:26.421041 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:44896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggqQlT9VtDQc7bgUyu4QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:27.789471 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:44902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggq46lpbStxTqkSktqaAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:28.892905 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:44912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggrHjZBu2q05ozVU9V4AAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:30.078894 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:50588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggrnbQATo66fKoS7xNXAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:31.872386 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:50598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggr3jZBu2q05ozVU9V4QAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:33.243143 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:50610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggsRXjF1vJNtV6CWrz1gAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:34.607408 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggshXjF1vJNtV6CWrz1wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:35.898624 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:50630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggswlT9VtDQc7bgUyu4wAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:37.230830 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:50634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggtf9ocpUE4ed4uDzsZQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:38.584355 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:50638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggto6lpbStxTqkSktqdAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:39.887276 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:50640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggtxXjF1vJNtV6CWrz2QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:41.219192 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:52486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgguXbQATo66fKoS7xNYAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:42.514239 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:52490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgguhXjF1vJNtV6CWrz2wAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:46.036626 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:52502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggvP9ocpUE4ed4uDzsaAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:48.482505 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:52508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggv3jZBu2q05ozVU9V4wAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:49.818183 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:52518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwXjZBu2q05ozVU9V5QAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:51.187290 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwwlT9VtDQc7bgUyu5wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:51.415046 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwwlT9VtDQc7bgUyu6AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:26:33.804570 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.228.16:32794] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abghKRXjF1vJNtV6CWrz6AAAAc0"]
[Mon Mar 16 12:26:56.783339 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:49418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abghQNSswJuvopo3lOhcLAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:28:15.007868 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:49812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abghj3bQATo66fKoS7xNuwAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:28:56.352799 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.244.31:34810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abghuBXjF1vJNtV6CWr0EgAAAcQ"]
[Mon Mar 16 12:30:38.086827 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:33148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiHnjZBu2q05ozVU9WeAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:31:34.594944 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.228.16:38762] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgiVpqj1wV0Si-OkefsewAAABI"]
[Mon Mar 16 12:31:51.682863 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:58258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiZNSswJuvopo3lOhc_AAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:32:26.661101 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiio6lpbStxTqkSktrBwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:32:39.398552 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:51030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgil7ysWC90G-1nBrBEFAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:40.783433 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:39524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgimNSswJuvopo3lOhdPgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:42.421063 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:39530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgimv9ocpUE4ed4uDzt3wAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:43.829448 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:39532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgim3jZBu2q05ozVU9WugAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:49.353319 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:39538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abginrysWC90G-1nBrBEFgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:00.831590 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:45868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgirJqj1wV0Si-OkefsmAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:03.355677 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:57098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgir3bQATo66fKoS7xN6QAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:07.014630 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:57112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgis7ysWC90G-1nBrBEHAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:08.370679 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:57128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgitLABkC4fWIHEf8HpBwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:12.443253 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:57130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiuHjZBu2q05ozVU9WwQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:13.791351 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:38592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiuQlT9VtDQc7bgUyvxQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:15.124097 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:38608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiu3bQATo66fKoS7xN7gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:16.436448 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:38624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgivBXjF1vJNtV6CWr0eQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:17.744083 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:38638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgivbABkC4fWIHEf8HpCAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:20.120668 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:38648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiwHbQATo66fKoS7xN8AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:21.408194 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:49888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiwY6lpbStxTqkSktrIgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:27.880003 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgix46lpbStxTqkSktrKAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:29.235214 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:49896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiyRXjF1vJNtV6CWr0ewAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:30.547123 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:33234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiyrABkC4fWIHEf8HpCQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:31.852841 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:33236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiy3jZBu2q05ozVU9WxQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:35.290341 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:33246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgizxXjF1vJNtV6CWr0fwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:37.606173 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:33250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi0QlT9VtDQc7bgUyv3wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:38.903082 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:33258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi0hXjF1vJNtV6CWr0gAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:40.222416 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:33458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1BXjF1vJNtV6CWr0gQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:42.670202 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:33470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1nbQATo66fKoS7xN8wAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:43.985400 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:33472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1xXjF1vJNtV6CWr0ggAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:45.167304 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:33476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi2XbQATo66fKoS7xN9AAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:48.780069 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:33482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi3LABkC4fWIHEf8HpDQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:50.197820 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:41942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi3glT9VtDQc7bgUyv7wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:52.676389 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi4AlT9VtDQc7bgUyv9AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:53.979037 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:41972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi4XbQATo66fKoS7xN-AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:57.398911 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:41978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi5RXjF1vJNtV6CWr0iwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:57.770754 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:49314] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgi5XbQATo66fKoS7xN-QAAAMs"]
[Mon Mar 16 12:33:59.838079 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:41982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi53jZBu2q05ozVU9WywAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:01.194561 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:58934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi6Zqj1wV0Si-OkefspQAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:02.521467 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:58942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi6pqj1wV0Si-OkefspgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:03.731666 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:58952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi67ysWC90G-1nBrBEIgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:05.075260 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:58958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi7Y6lpbStxTqkSktrMAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:06.249274 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:58966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi7rABkC4fWIHEf8HpFAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:08.775161 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:58970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi8AlT9VtDQc7bgUywCAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:13.515046 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:58980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi9Y6lpbStxTqkSktrNgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:14.735043 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:36650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi9o6lpbStxTqkSktrNwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:17.171056 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:36664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi-dSswJuvopo3lOhdaQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:19.642596 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi-9SswJuvopo3lOhdbQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:01.046458 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:47000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJRXjF1vJNtV6CWr0uAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:02.695797 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:41948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJo6lpbStxTqkSktrQgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:03.854596 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJ46lpbStxTqkSktrQwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:39.170499 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:41964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjS3bQATo66fKoS7xOJwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:42.483046 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:49778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjTnbQATo66fKoS7xOKgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:44.926640 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:49782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjULysWC90G-1nBrBEOgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:52.291495 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:47652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjWLABkC4fWIHEf8HpcAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:54.900671 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:46224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjWRXjF1vJNtV6CWr0xQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:55.955619 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:49792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjW_9ocpUE4ed4uDzuWwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:57.228242 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:35894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjXXjZBu2q05ozVU9W6gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:00.411044 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:46226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjYHjZBu2q05ozVU9W8AAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:01.683238 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:44712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjYbABkC4fWIHEf8HpcgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:05.262397 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:44718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjZXjZBu2q05ozVU9W9wAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:06.554770 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:44734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjZglT9VtDQc7bgUywNAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:08.847011 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:44746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjaP9ocpUE4ed4uDzuYgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:10.161541 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:48000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjahXjF1vJNtV6CWr0ygAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:11.386639 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:48012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgja46lpbStxTqkSktrUwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:12.686332 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:48024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjbHjZBu2q05ozVU9W_wAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:13.847853 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:48026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjbXjZBu2q05ozVU9XAQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:15.162071 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:48028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjb7ABkC4fWIHEf8HpdQAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:15.521091 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:35906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjb3jZBu2q05ozVU9XAwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:17.506822 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:48040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjcZqj1wV0Si-OkefsxgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:18.764519 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:50992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjcnbQATo66fKoS7xOLgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:19.903334 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:50998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjc_9ocpUE4ed4uDzuZwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:21.214757 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:51010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjdRXjF1vJNtV6CWr0zgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:22.370359 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:51012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjdrysWC90G-1nBrBEQQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:23.567571 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:51026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjd3bQATo66fKoS7xOMQAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:24.834930 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:51042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjeHjZBu2q05ozVU9XBwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:25.992772 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:51056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjebABkC4fWIHEf8HpdwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:28.477528 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:51072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgje46lpbStxTqkSktrVwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:29.828386 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:60932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjfXbQATo66fKoS7xONgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:31.903105 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:60938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjf9SswJuvopo3lOhdkQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:33.196940 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:60952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgbABkC4fWIHEf8HpewAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:34.595052 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:60968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgo6lpbStxTqkSktrWQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:35.930819 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.241.46:60976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgxXjF1vJNtV6CWr00wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:37.245804 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:60986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjhRXjF1vJNtV6CWr01AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:38.563567 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:57276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjhpqj1wV0Si-OkefsygAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:39.858666 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.228.16:37040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgjh_9ocpUE4ed4uDzuagAAAgQ"]
[Mon Mar 16 12:36:39.867941 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:57280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjh9SswJuvopo3lOhdmQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:42.084905 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:57296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjirysWC90G-1nBrBERwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:44.418372 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:57300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjjP9ocpUE4ed4uDzubgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:46.845823 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:57314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjjbABkC4fWIHEf8HpfQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:48.239380 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:35084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkHjZBu2q05ozVU9XCwAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:49.002349 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:53466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkdSswJuvopo3lOhdoQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:49.394530 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:35094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkXjZBu2q05ozVU9XDAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:50.702901 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:35100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkpqj1wV0Si-OkefszwAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:51.331156 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjk5qj1wV0Si-Okefs0AAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:51.859195 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:35108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjk46lpbStxTqkSktrXQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:52.637326 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:55588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlI6lpbStxTqkSktrXgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:53.136158 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:35112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlZqj1wV0Si-Okefs0QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:55.063151 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:55604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlxXjF1vJNtV6CWr02QAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:55.379555 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:35122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjl5qj1wV0Si-Okefs1AAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:56.699236 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:35134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjmLABkC4fWIHEf8HpgQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:01.178931 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:35144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjnXbQATo66fKoS7xORAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:03.997984 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:54072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjnnbQATo66fKoS7xORwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:05.330960 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:54080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjoRXjF1vJNtV6CWr02gAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:06.557526 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:54094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjorysWC90G-1nBrBESwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:07.733886 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjo46lpbStxTqkSktrYQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:08.943773 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:36588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjpI6lpbStxTqkSktrYwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:09.350608 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:55612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjpQlT9VtDQc7bgUywfgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:10.088021 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:36590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjprABkC4fWIHEf8HphAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:15.661801 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:36606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjq7ysWC90G-1nBrBEUQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:20.292051 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:36614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjsAlT9VtDQc7bgUywjQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:21.583334 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:45318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjsf9ocpUE4ed4uDzudgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:25.260755 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:45326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjtNSswJuvopo3lOhdqAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:26.616262 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:45334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjtrysWC90G-1nBrBEVAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:31.844984 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:45344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgju7ABkC4fWIHEf8HpjAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:35.107900 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:57244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjv_9ocpUE4ed4uDzuewAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:36.405683 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:57252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwNSswJuvopo3lOhdqgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:37.539052 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:57256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwXbQATo66fKoS7xOTQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:38.862381 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:42366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwrysWC90G-1nBrBEWAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:40.039628 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:42370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjxI6lpbStxTqkSktrbAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:42.197164 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:42372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjxo6lpbStxTqkSktrbgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:47.718323 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:45170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjy5qj1wV0Si-Okefs_wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:53.591389 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:42388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj0Zqj1wV0Si-OkeftBgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:54.922310 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:34248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj0o6lpbStxTqkSktrcwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:58.435401 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:34252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj1rABkC4fWIHEf8HpkQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:04.412573 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:38980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj3LysWC90G-1nBrBEXwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:06.819447 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:38986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj3nbQATo66fKoS7xOUgAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:08.087407 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:38994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj4LABkC4fWIHEf8HplgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:11.299910 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:51400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj4xXjF1vJNtV6CWr05wAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:15.674695 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:51404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj5_9ocpUE4ed4uDzuigAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:16.938391 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:51414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj6BXjF1vJNtV6CWr06gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:20.299425 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:47678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj7P9ocpUE4ed4uDzujgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:21.591136 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:47686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj7RXjF1vJNtV6CWr07QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:24.692246 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj8LABkC4fWIHEf8HpmwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:25.997055 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:47704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj8Zqj1wV0Si-OkeftNAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:28.243460 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:47710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj9P9ocpUE4ed4uDzukQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:29.532706 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj9f9ocpUE4ed4uDzukgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:32.913758 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:47712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj-AlT9VtDQc7bgUywuAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:37.507621 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:47726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_QlT9VtDQc7bgUywvgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:38.564576 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:42494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_tSswJuvopo3lOhd8QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:38.846959 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:50068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_rABkC4fWIHEf8HpnwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:39.871679 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj__9ocpUE4ed4uDzulgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:40.138956 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:50084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAHjZBu2q05ozVU9XMQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:41.137034 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:39650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAXbQATo66fKoS7xOWgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:42.537420 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:50086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAhXjF1vJNtV6CWr1AAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:44.958642 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:50102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkBHjZBu2q05ozVU9XNwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:47.009191 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:39660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkB3bQATo66fKoS7xOXgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:47.379571 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:50108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkB7ABkC4fWIHEf8HpogAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:50.759649 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:48528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkCv9ocpUE4ed4uDzunwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:52.955648 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:39664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkDP9ocpUE4ed4uDzuogAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:55.228816 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:43062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkD7ysWC90G-1nBrBEcwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:57.956099 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.244.31:59588] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgkEQlT9VtDQc7bgUywwgAAAQk"]
[Mon Mar 16 12:38:59.178781 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:43070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkExXjF1vJNtV6CWr1BwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:00.443436 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:48542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkFHbQATo66fKoS7xOaAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:02.542237 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:47520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkFhXjF1vJNtV6CWr1DQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:08.126713 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:55810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHHjZBu2q05ozVU9XRQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:09.405376 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:53520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHXjZBu2q05ozVU9XRwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:10.115949 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:47524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHhXjF1vJNtV6CWr1FQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:12.303324 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:46108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkH3jZBu2q05ozVU9XSAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:14.647502 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:46118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkIrABkC4fWIHEf8HpswAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:16.571807 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:53534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkJBXjF1vJNtV6CWr1HQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:39:19.973249 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:53546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkJ3bQATo66fKoS7xOawAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:24.221523 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:46130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkLBXjF1vJNtV6CWr1JgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:26.612801 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkLpqj1wV0Si-OkeftbwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:29.979791 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:34626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkMZqj1wV0Si-OkefteAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:32.332517 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:44088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkNJqj1wV0Si-OkeftfAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:37.188354 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:44100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkOZqj1wV0Si-OkeftiAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:46.070098 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:44116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkQnbQATo66fKoS7xOdQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:49.412769 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkRbABkC4fWIHEf8HptwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:51.844447 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:59448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkRxXjF1vJNtV6CWr1KgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:53.183412 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:59452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkSXbQATo66fKoS7xOdwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:04.965024 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkVHjZBu2q05ozVU9XWAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:11.585491 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:55932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkW9SswJuvopo3lOheAwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:19.291705 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:43784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkYxXjF1vJNtV6CWr1MwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:26.123371 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:60802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkao6lpbStxTqkSktrtQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:30.766495 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:60816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkbtSswJuvopo3lOheCAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:37.760655 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:44400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkdRXjF1vJNtV6CWr1PgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:39.126960 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:44410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkd3bQATo66fKoS7xOhgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:43.751617 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:39796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgke7ysWC90G-1nBrBEyQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:40:45.142303 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:48678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkfXjZBu2q05ozVU9XXQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:49.389822 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:37528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkgXbQATo66fKoS7xOlQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:50.665715 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:45760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkgnbQATo66fKoS7xOlgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:51.984458 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:45774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkg46lpbStxTqkSktruwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:57.516253 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:45788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkiZqj1wV0Si-OkeftsgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:03.456074 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:45804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkj_9ocpUE4ed4uDzuvgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:08.161945 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:38820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgklJqj1wV0Si-OkeftuQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:09.465427 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:38836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgklZqj1wV0Si-OkeftuwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:24.272214 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:36608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkpAlT9VtDQc7bgUyxNgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:34.334290 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:55316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkrnbQATo66fKoS7xOzgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:37.755759 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:52244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgksXbQATo66fKoS7xO1gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:39.066208 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgks5qj1wV0Si-OkeftvwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:41.448591 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.228.16:52748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgktRXjF1vJNtV6CWr1SwAAAcw"]
[Mon Mar 16 12:41:47.736441 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:40886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgku5qj1wV0Si-OkeftxwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:06.179597 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:40894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkznbQATo66fKoS7xPBQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:09.648413 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:42062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk0QlT9VtDQc7bgUyxXgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:11.995901 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:55996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk0_9ocpUE4ed4uDzuyAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:15.384294 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:56002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk1_9ocpUE4ed4uDzuzQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:22.755466 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:56004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk3njZBu2q05ozVU9XcQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:25.155424 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:54160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk4RXjF1vJNtV6CWr1YgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:14.283520 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:60910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglEnbQATo66fKoS7xPSwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:17.642933 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:39998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglFf9ocpUE4ed4uDzu2wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:26.881225 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:54164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglHo6lpbStxTqkSktsHAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:39.582867 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:36654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglKxXjF1vJNtV6CWr1sQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:45.304950 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:58684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglMbysWC90G-1nBrBE6QAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:47.736173 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:58698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglM7ABkC4fWIHEf8Hp1gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:50.552977 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:58712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglNv9ocpUE4ed4uDzu4QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:58.280224 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:44320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglPglT9VtDQc7bgUyxeAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:59.576266 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:44332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglP3bQATo66fKoS7xPUwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:44:00.765884 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:51330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglQHbQATo66fKoS7xPVAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:44:03.079122 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:51346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglQ7ABkC4fWIHEf8Hp2gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:10.613646 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:51348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglhrysWC90G-1nBrBFJwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:16.384895 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:39058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgljJqj1wV0Si-Okeft-gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:17.691037 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgljXbQATo66fKoS7xPZgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:28.437327 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:39074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglmLysWC90G-1nBrBFMgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:46:27.902281 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:47584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgl0rABkC4fWIHEf8HqkAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:46:43.570727 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:45932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgl4glT9VtDQc7bgUyxvAAAARg"]
[Mon Mar 16 12:47:31.415099 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:43688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmEwlT9VtDQc7bgUyx-QAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:48:05.068265 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:55218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmNQlT9VtDQc7bgUyyHgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:48:43.689505 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:36214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmW9SswJuvopo3lOhfSgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:49:00.123633 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:41684] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgmbNSswJuvopo3lOhfSwAAAJc"]
[Mon Mar 16 12:49:40.429701 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:39290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmlBXjF1vJNtV6CWr2hQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:12.572650 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:33238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmtLysWC90G-1nBrBFlgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:18.331127 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:47254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmupqj1wV0Si-OkefueQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:18.398871 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:38336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmunbQATo66fKoS7xPxAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:19.627058 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:58488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmu5qj1wV0Si-OkefuewAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:50:21.919917 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:38350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmvQlT9VtDQc7bgUyyTgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:24.326505 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:57322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmwHjZBu2q05ozVU9X6gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:26.682272 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:57328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmwtSswJuvopo3lOhfZAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:27.966730 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:57330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmw9SswJuvopo3lOhfZQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:29.245873 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:57332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxRXjF1vJNtV6CWr2jQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:29.551793 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:58498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxbysWC90G-1nBrBFnwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:30.559617 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:52576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxhXjF1vJNtV6CWr2jgAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:36.819011 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:52582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmzBXjF1vJNtV6CWr2lQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:42.550777 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:52594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm0nbQATo66fKoS7xPzwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:46.490066 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm1o6lpbStxTqkSktszQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:11.235971 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:38648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm73jZBu2q05ozVU9YFgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:51:11.989423 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:52050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm77ysWC90G-1nBrBFuQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:15.707264 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:49218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm83bQATo66fKoS7xP4AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:16.771544 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:34950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9AlT9VtDQc7bgUyyZgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:51:17.068030 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9dSswJuvopo3lOhfcgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:18.394182 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:49236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9tSswJuvopo3lOhfcwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:19.583361 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:49242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm99SswJuvopo3lOhfdgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:24.103946 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:58330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_LABkC4fWIHEf8HrjgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:25.389381 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:58342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_bABkC4fWIHEf8HrkAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:26.658405 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:58344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_njZBu2q05ozVU9YFwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:28.055299 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnAP9ocpUE4ed4uDzvQQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:34.458170 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:58368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnBpqj1wV0Si-OkefumgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:35.765583 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:33682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnB3jZBu2q05ozVU9YGgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:45.994155 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.228.16:37660] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgnEAlT9VtDQc7bgUyybQAAAQM"]
[Mon Mar 16 12:52:01.680801 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnIbABkC4fWIHEf8HrqAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:14.286955 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:45282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnLv9ocpUE4ed4uDzveQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:29.750361 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:33242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnPRXjF1vJNtV6CWr2vwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:32.247945 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:54220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQBXjF1vJNtV6CWr2wgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:33.111532 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:52114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQf9ocpUE4ed4uDzvjgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:52:33.552980 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:54236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQXbQATo66fKoS7xP9AAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:35.979746 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:54240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQ46lpbStxTqkSkts8QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:54.608074 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnVnbQATo66fKoS7xQDAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:52:55.846544 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:54254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnV7ABkC4fWIHEf8HrwAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:58.583439 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:41102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnWo6lpbStxTqkSkts_QAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:52:59.424474 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:48604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnW46lpbStxTqkSkts_wAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:00.735033 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnXAlT9VtDQc7bgUyyewAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:04.178125 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:54036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnYLABkC4fWIHEf8HrwwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:09.027048 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:54040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnZZqj1wV0Si-OkefusAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:12.674963 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:38196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnZhXjF1vJNtV6CWr22AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:33.271890 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:38208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnff9ocpUE4ed4uDzvrgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:34.594704 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:58430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnfhXjF1vJNtV6CWr24QAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:38.508662 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:58436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgngglT9VtDQc7bgUyymwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:40.984286 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:58448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnhHbQATo66fKoS7xQIAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:43.334349 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:41130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnh46lpbStxTqkSkttBwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:44.651402 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:41136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgniHjZBu2q05ozVU9YPAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:45.975929 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:41142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnibysWC90G-1nBrBGOAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:47.309504 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:41154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgni46lpbStxTqkSkttCgAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:48.619330 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:41164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjHjZBu2q05ozVU9YPgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:49.467220 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:38610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjdSswJuvopo3lOhfxAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:53:49.942928 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:41180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjbysWC90G-1nBrBGPAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:51.267094 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:55074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnj3bQATo66fKoS7xQLAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:52.409009 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:55084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnkI6lpbStxTqkSkttDAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:53.840509 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:55094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnkQlT9VtDQc7bgUyyoAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:56.264105 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:55110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnk3jZBu2q05ozVU9YQQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:57.601941 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:55120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnlZqj1wV0Si-OkefuvwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:58.971409 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:55124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnlpqj1wV0Si-OkefuwAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:00.313121 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:46504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmHbQATo66fKoS7xQNwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:00.384170 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:57094] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgnmHbQATo66fKoS7xQOAAAAMk"]
[Mon Mar 16 12:54:01.443957 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:46510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmXjZBu2q05ozVU9YRAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:02.778848 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:46522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmnjZBu2q05ozVU9YRQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:03.943181 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:46532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnm7ABkC4fWIHEf8Hr1wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:05.348475 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:46542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnnbABkC4fWIHEf8Hr2gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:06.699012 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:46552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnnrysWC90G-1nBrBGQgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:08.088914 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:46560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnoNSswJuvopo3lOhfxwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:09.289899 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:46562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnoZqj1wV0Si-OkefuwQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:10.490861 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:58472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnopqj1wV0Si-OkefuwgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:11.685956 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:58478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgno9SswJuvopo3lOhfygAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:13.197471 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:58488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnpLABkC4fWIHEf8Hr5AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:15.650279 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnprysWC90G-1nBrBGQwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:18.545837 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:58518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnqRXjF1vJNtV6CWr27gAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:19.962286 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:58532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnq3jZBu2q05ozVU9YSwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:22.426825 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:48682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnrnjZBu2q05ozVU9YTwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:23.718351 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:48686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnrwlT9VtDQc7bgUyywQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:25.016070 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:48690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnsY6lpbStxTqkSkttEwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:26.264741 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:48704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnsrABkC4fWIHEf8Hr5wAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:27.627025 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:48718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnswlT9VtDQc7bgUyyxwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:28.922867 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:48730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgntNSswJuvopo3lOhfzgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:30.270918 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:56772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnthXjF1vJNtV6CWr29AAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:31.463523 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:56782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnt_9ocpUE4ed4uDzvvQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:32.746413 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:56798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnuLysWC90G-1nBrBGSQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:34.055337 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:56814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnuglT9VtDQc7bgUyyzQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:35.192038 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:56822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnu9SswJuvopo3lOhfzwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:36.476477 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:56836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvHjZBu2q05ozVU9YVQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:37.660349 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:56838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvRXjF1vJNtV6CWr29QAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:38.959928 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:56844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvnbQATo66fKoS7xQWgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:40.241255 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:33340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwHjZBu2q05ozVU9YVwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:41.538071 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwf9ocpUE4ed4uDzvvwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:42.867045 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:33364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwv9ocpUE4ed4uDzvwQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:44.203124 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:33368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnxAlT9VtDQc7bgUyy2QAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:46.461657 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:33376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnxv9ocpUE4ed4uDzvxAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:47.784975 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:33390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnx_9ocpUE4ed4uDzvxQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:49.103162 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnybysWC90G-1nBrBGTQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:50.323390 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:53742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnyhXjF1vJNtV6CWr2-gAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:51.677526 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:53756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgny5qj1wV0Si-Okefu1QAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:52.929832 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:53768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnzBXjF1vJNtV6CWr2_AAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:54.217365 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:53776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnznjZBu2q05ozVU9YWQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:55.583213 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:53778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnz9SswJuvopo3lOhf0wAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:57.747420 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn0Y6lpbStxTqkSkttHwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:59.087256 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:53786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn0wlT9VtDQc7bgUyy6wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:00.339347 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:33536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn1BXjF1vJNtV6CWr2_wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:01.584675 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:33542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn1bABkC4fWIHEf8Hr8gAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:05.436595 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn2RXjF1vJNtV6CWr3CAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:06.971359 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:33564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn2rysWC90G-1nBrBGUAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:55:13.487429 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:33566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn4bABkC4fWIHEf8Hr-QAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:17.123483 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:51796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn5Y6lpbStxTqkSkttKwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:19.610003 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:51798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn5nbQATo66fKoS7xQfwAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:38.840114 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:43970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn-nbQATo66fKoS7xQpwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:47.956456 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:33626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoA7ABkC4fWIHEf8HsBQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:56:12.234673 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:44644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoHNSswJuvopo3lOhf6wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:56:15.884625 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:39496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoH7ysWC90G-1nBrBGZAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:56:51.789642 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.228.16:33010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgoQ5qj1wV0Si-Okefu8AAAAAI"]
[Mon Mar 16 12:56:54.839202 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:39502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoRtSswJuvopo3lOhgFwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:16.535416 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:58354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoXJqj1wV0Si-OkefvCQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:29.850957 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:58270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoaY6lpbStxTqkSkttYgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:46.019435 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:58190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoenjZBu2q05ozVU9Y6gAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:58:12.289489 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:46976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgolP9ocpUE4ed4uDzwGgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:18.263540 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:60850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgomrysWC90G-1nBrBGkQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:41.488294 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:59990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgosQlT9VtDQc7bgUyz6gAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:58:44.578237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:60862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgotJqj1wV0Si-OkefvRAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:46.016965 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:40596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgotrysWC90G-1nBrBGnAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:52.386945 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:53916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgovI6lpbStxTqkSkttgQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:00.679800 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:53436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoxHbQATo66fKoS7xRJAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:03.165658 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:41534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgox46lpbStxTqkSkttkQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:59:03.507421 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:40186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgox9SswJuvopo3lOhgQgAAAJg"]
[Mon Mar 16 12:59:08.863115 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:41536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgozP9ocpUE4ed4uDzwNQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:59:09.846334 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:40608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgozY6lpbStxTqkSkttlwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:17.114012 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:34032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo1QlT9VtDQc7bgUyz-gAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:20.723051 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:34042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo2LABkC4fWIHEf8HsSwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:34.183855 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:54104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo5njZBu2q05ozVU9ZKAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:47.611954 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo8xXjF1vJNtV6CWr3cQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:49.860195 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:46402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo9Zqj1wV0Si-OkefvdAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:51.234913 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:44472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo946lpbStxTqkSkttpAAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:00:00.183945 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:44474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpAP9ocpUE4ed4uDzwTQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:00.727726 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:49384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpAHbQATo66fKoS7xRbQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:07.315408 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:39196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpB46lpbStxTqkSkttsQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:11.952775 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:39212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpC_9ocpUE4ed4uDzwWAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:13.287449 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:53680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpDbABkC4fWIHEf8HsXgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:14.564431 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:53692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpDhXjF1vJNtV6CWr3eQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:16.011442 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:35830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpEHjZBu2q05ozVU9ZSAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:25.747208 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:53702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpGbysWC90G-1nBrBGyAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:27.324614 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:56932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpG3jZBu2q05ozVU9ZSQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:32.703168 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:44068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpINSswJuvopo3lOhgbAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:38.244496 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:36872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpJo6lpbStxTqkSkttuQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:40.489775 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:56934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpKNSswJuvopo3lOhgcQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:40.624063 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:33354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpKJqj1wV0Si-OkefvjAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:46.170078 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:33356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpLQlT9VtDQc7bgUy0HAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:03.359015 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:37514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpP9SswJuvopo3lOhgigAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:05.769329 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpQXjZBu2q05ozVU9ZZgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:07.044585 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:47720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpQ3bQATo66fKoS7xRpQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:14.647078 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:47730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpSnbQATo66fKoS7xRrgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:18.610461 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:58494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpTv9ocpUE4ed4uDzwewAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:23.200078 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:42858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpU7ABkC4fWIHEf8HsjQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:01:24.423898 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:58502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpVLysWC90G-1nBrBG5AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:26.811694 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:41882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpVhXjF1vJNtV6CWr3zQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:28.104128 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:41890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpWAlT9VtDQc7bgUy0NgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:29.339829 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:41896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpWZqj1wV0Si-OkefvrwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:33.061487 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:34210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpXdSswJuvopo3lOhgngAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:34.355750 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:49696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpXpqj1wV0Si-OkefvsQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:36.906167 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:46086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpYI6lpbStxTqkSktt1gAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:38.194099 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:46102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpYtSswJuvopo3lOhgnwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:50.177492 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:49704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpbpqj1wV0Si-OkefvxgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:52.935665 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:49990] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgpcI6lpbStxTqkSktt2gAAAkw"]
[Mon Mar 16 13:02:07.772121 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:44596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpfwlT9VtDQc7bgUy0WgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:02:11.163139 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:42210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpg9SswJuvopo3lOhgsQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:12.481259 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:42222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgphHjZBu2q05ozVU9ZggAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:34.246755 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:42238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpmo6lpbStxTqkSktuAgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 13:02:54.719884 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:46118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgprrABkC4fWIHEf8Hs6gAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:56.030959 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:38440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsAlT9VtDQc7bgUy0gQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:57.171222 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:38442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsbysWC90G-1nBrBHBQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:57.448667 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsbysWC90G-1nBrBHBgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:58.747742 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:38456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsv9ocpUE4ed4uDzwmAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:00.024899 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:38468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgptJqj1wV0Si-Okefv3QAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:03.506970 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:51058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpt46lpbStxTqkSktuDwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:04.841985 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:51070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpuJqj1wV0Si-Okefv4AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:06.127512 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:51074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpupqj1wV0Si-Okefv5QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:08.637135 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:51084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpvJqj1wV0Si-Okefv6wAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:10.030424 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:51094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpvglT9VtDQc7bgUy0kAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:12.371339 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:56936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpwBXjF1vJNtV6CWr4JwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:13.688430 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:56946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpwXbQATo66fKoS7xR4AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:17.032802 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:56948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxRXjF1vJNtV6CWr4KQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:18.451572 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:56964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxpqj1wV0Si-Okefv7wAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:19.163461 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:51102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxwlT9VtDQc7bgUy0mAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:20.703085 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:56976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxwlT9VtDQc7bgUy0mQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:22.051028 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:59880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpyv9ocpUE4ed4uDzwpAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:23.402023 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:59888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpy7ABkC4fWIHEf8Hs9wAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:24.711619 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:59900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpzLysWC90G-1nBrBHDAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:28.591462 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:59902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0AlT9VtDQc7bgUy0rQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:29.939034 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:59906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0XbQATo66fKoS7xR5wAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:30.585684 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:52566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0glT9VtDQc7bgUy0rwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:33.425200 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:43572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp1Y6lpbStxTqkSktuKAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:34.719164 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:43586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp1nbQATo66fKoS7xR6wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:37.011974 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:43600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp2Zqj1wV0Si-Okefv-AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:40.378857 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:43602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp3HbQATo66fKoS7xR7gAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:03.291560 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:45780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp83jZBu2q05ozVU9Z1AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:04:04.244763 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:56244] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgp9HjZBu2q05ozVU9Z1QAAAU0"]
[Mon Mar 16 13:04:05.620279 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:36412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp9f9ocpUE4ed4uDzwsQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:20.337054 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:36414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqBLABkC4fWIHEf8HtDwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:04:21.436485 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:60312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqBXbQATo66fKoS7xSFwAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:26.671186 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:35326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqCbABkC4fWIHEf8HtFQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:26.674872 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:32872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqCv9ocpUE4ed4uDzwvAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:29.128686 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:32874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqDdSswJuvopo3lOhhJAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:04:32.898006 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:35336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqEAlT9VtDQc7bgUy07gAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:34.174607 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:41248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqEtSswJuvopo3lOhhKQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:35.351071 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:41264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqE9SswJuvopo3lOhhLAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:36.562704 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFHjZBu2q05ozVU9Z4wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:37.823375 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:41280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFRXjF1vJNtV6CWr4OAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:38.977890 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:41282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFhXjF1vJNtV6CWr4OQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:05:02.474054 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:35732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqLglT9VtDQc7bgUy1LQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:03.820538 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:58566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqL3bQATo66fKoS7xSHQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:05.123035 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:58568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqMY6lpbStxTqkSktuOwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:07.546417 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:58584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqM9SswJuvopo3lOhhNgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:14.072871 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:58596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqOpqj1wV0Si-OkefwFgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:16.475583 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPHjZBu2q05ozVU9aEAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:17.850216 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:60134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPbABkC4fWIHEf8HtPAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:19.161317 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:60146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPwlT9VtDQc7bgUy1QwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:20.430225 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqQAlT9VtDQc7bgUy1RwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:23.334250 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:45926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqQpqj1wV0Si-OkefwGgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:25.761405 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:45940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqRbABkC4fWIHEf8HtRgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:27.104856 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:45946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqR7ysWC90G-1nBrBHKwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:28.386787 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:45960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSNSswJuvopo3lOhhOgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:29.662823 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSRXjF1vJNtV6CWr4QwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:30.983053 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:42984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSnjZBu2q05ozVU9aIgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:33.348877 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:42988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqTQlT9VtDQc7bgUy1UQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:37.766011 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:42990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqUXjZBu2q05ozVU9aLQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:39.111035 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:42992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqU_9ocpUE4ed4uDzwyAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:40.265341 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:48688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqVNSswJuvopo3lOhhQQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:41.630785 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:48696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqVdSswJuvopo3lOhhQgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:44.230263 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:48706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWNSswJuvopo3lOhhRAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:45.532904 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:48722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWbABkC4fWIHEf8HtYQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:46.685067 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWrysWC90G-1nBrBHLQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:47.963017 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:48736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWwlT9VtDQc7bgUy1VwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:48.355683 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:53870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXHjZBu2q05ozVU9aOQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:05:49.234058 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:48738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXRXjF1vJNtV6CWr4RgAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:50.502801 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:47118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXtSswJuvopo3lOhhRQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:51.843072 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:47130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqX7ABkC4fWIHEf8HtZwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:53.699180 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:47140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqYbABkC4fWIHEf8HtaAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:54.965954 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:47148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqYo6lpbStxTqkSktuSAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:57.431207 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:47162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqZP9ocpUE4ed4uDzw2gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:59.737911 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:47164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqZ_9ocpUE4ed4uDzw3wAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:02.158091 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqarABkC4fWIHEf8HtcwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:03.477297 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:34704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqa9SswJuvopo3lOhhRgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:04.782000 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqbLysWC90G-1nBrBHNAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:07.057084 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:34730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqbxXjF1vJNtV6CWr4TAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:08.418660 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:34732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqcHbQATo66fKoS7xSKgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:09.811463 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:34734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqcXbQATo66fKoS7xSLAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:12.366155 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:43276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqdI6lpbStxTqkSktuTAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:14.678013 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:43292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqdrysWC90G-1nBrBHOAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:15.585477 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:44816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqd5qj1wV0Si-OkefwPQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:16.140278 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:43302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqeP9ocpUE4ed4uDzw7QAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:17.447968 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:43306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqebysWC90G-1nBrBHOQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:19.640205 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:43308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqetSswJuvopo3lOhhSQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:20.934884 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqfLysWC90G-1nBrBHOgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:24.288270 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:48264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgJqj1wV0Si-OkefwQQAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:25.581029 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:48274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgQlT9VtDQc7bgUy1ZgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:26.903005 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:48282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgnjZBu2q05ozVU9aTAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:32.403875 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:48284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqiI6lpbStxTqkSktuVwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:33.662600 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:49698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqiRXjF1vJNtV6CWr4UgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:34.959245 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:49700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqio6lpbStxTqkSktuWQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:37.259091 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:49710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqjdSswJuvopo3lOhhTgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:38.598259 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:49720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqjnjZBu2q05ozVU9aWQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:39.870204 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:49732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqj_9ocpUE4ed4uDzw8QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:42.075161 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqkv9ocpUE4ed4uDzw8wAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:43.450913 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:45972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqkwlT9VtDQc7bgUy1bAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:44.781364 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:45974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqlHjZBu2q05ozVU9aYAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:50.517119 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:45976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqmrABkC4fWIHEf8HtowAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:54.770702 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.228.16:60572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgqnXbQATo66fKoS7xSNwAAANQ"]
[Mon Mar 16 13:06:55.839616 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:40378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqn9SswJuvopo3lOhhWgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:00.339738 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:40386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqpJqj1wV0Si-OkefwTgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:34.743547 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:40500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqxo6lpbStxTqkSktuiQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:59.819065 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:51658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq37ysWC90G-1nBrBHZAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:07.716414 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:53038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq5wlT9VtDQc7bgUy1iQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:13.465369 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:53054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq7Y6lpbStxTqkSktulQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:21.227309 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:46310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq9Zqj1wV0Si-OkefwbAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:23.903089 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:60344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq97ysWC90G-1nBrBHawAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:28.837226 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:60356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq_AlT9VtDQc7bgUy1kAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:30.213209 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:34308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq_nbQATo66fKoS7xSVQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:33.272178 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:60366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrAZqj1wV0Si-OkefwdAAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:34.588785 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrApqj1wV0Si-OkefwdQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:34.762148 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:39438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrAnbQATo66fKoS7xSWQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:44.195214 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:39446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrDLABkC4fWIHEf8HtygAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:54.495331 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrFpqj1wV0Si-OkefwhgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:09:06.227193 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.244.31:47606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgrIv9ocpUE4ed4uDzxcQAAAhM"]
[Mon Mar 16 13:09:20.960275 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:40228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrMLABkC4fWIHEf8Ht7QAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:09:42.605083 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:42908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrRrABkC4fWIHEf8HuAQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:09:45.082213 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:47782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrSXbQATo66fKoS7xSZQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:09:55.166275 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:47792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrU7ysWC90G-1nBrBHggAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:10:46.814638 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:40824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrhnjZBu2q05ozVU9bNQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:01.591348 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:50048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrlY6lpbStxTqkSktu4QAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:10.632287 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:58596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrnglT9VtDQc7bgUy1tAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:16.951654 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:42622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrpAlT9VtDQc7bgUy1uQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 13:11:23.354587 2026] [:error] [pid 15968:tid 140411607643904] [client 74.7.243.203:41776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrq69Q3DFy3Odql0Cu9QAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:26.853522 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:59814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrrpqj1wV0Si-OkefwqAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:27.878924 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:53274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrr5qj1wV0Si-OkefwqQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:29.307168 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:49466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrsXjZBu2q05ozVU9bOQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:32.891588 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:59830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrtP9ocpUE4ed4uDzxlAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:01.795825 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:46482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr0Y6lpbStxTqkSktu_wAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:03.107518 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:38476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr06QpVkWug9HeOt84XQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:03.647828 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:49472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr06TCbgAP5jq5TegsfQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:06.667531 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:38480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr1v9ocpUE4ed4uDzxnQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:10.122230 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:38486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr2lajLEzk2WiQ-10VvQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:14.521098 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:36712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr3nbQATo66fKoS7xSgQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:15.668618 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:42482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr3wlT9VtDQc7bgUy1-AAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:17.075994 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:38660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr4XbQATo66fKoS7xSgwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:23.467117 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:33212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr56QpVkWug9HeOt84ZAAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:27.343669 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:33228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr6wlT9VtDQc7bgUy2BQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:42.058191 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:38516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr-tSswJuvopo3lOhhqQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:46.125913 2026] [:error] [pid 15329:tid 140411616036608] [client 74.7.243.203:42498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr_h1q6tjNW06wcg32MgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:47.410933 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:45800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr_46lpbStxTqkSktvBAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:54.289921 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:45812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsBpqj1wV0Si-OkefwxgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:13:55.639096 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:46216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsQ46lpbStxTqkSktvKAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:06.402779 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:33598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgsTtSswJuvopo3lOhh7QAAAIA"]
[Mon Mar 16 13:14:08.243254 2026] [:error] [pid 15329:tid 140411649607424] [client 74.7.241.46:44892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsUB1q6tjNW06wcg32RQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:14:26.735875 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:56374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsYtSswJuvopo3lOhiBgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:28.067015 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:57250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsZKTCbgAP5jq5TegslwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:34.173520 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:57264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsaqQpVkWug9HeOt84ewAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:14:35.478384 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:50594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsa9SswJuvopo3lOhiCQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:14:50.075403 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:40068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsepqj1wV0Si-OkefxLgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:34.796011 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:50606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgspnjZBu2q05ozVU9bggAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:15:38.428958 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:55622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsqo6lpbStxTqkSktvMgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:40.191359 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:35436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsrJqj1wV0Si-OkefxgQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:40.866675 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:55636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsrKQpVkWug9HeOt84ggAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:16:21.219245 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:40150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs1f9ocpUE4ed4uDzx5AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:16:28.015206 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs3AlT9VtDQc7bgUy2fwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:16:51.958082 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:45084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs86TCbgAP5jq5Tegs4QAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:17:58.565426 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:53670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtNqTCbgAP5jq5TegtSwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:03.264038 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:42016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtO6TCbgAP5jq5TegtUgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:18:05.603411 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:49574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtPZqj1wV0Si-OkefxlwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:23.859839 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtT6TCbgAP5jq5TegtbgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:26.448263 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:42366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtUpqj1wV0Si-OkefxoQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:18:37.184624 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtXdSswJuvopo3lOhibQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:47.793700 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:42374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtZ6QpVkWug9HeOt84pQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:07.927888 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:37810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgte46lpbStxTqkSktvXAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:09.269901 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:44198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtfbysWC90G-1nBrBH4AAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:55.389337 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:60594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtq7ABkC4fWIHEf8HunwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:16.917988 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:48872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtwI6lpbStxTqkSktvmQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:30.492402 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:58648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtzVajLEzk2WiQ-10V8gAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:33.217026 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgt0f9ocpUE4ed4uDzyKgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:17.870979 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgt_Zqj1wV0Si-Okefx-QAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:21:25.776617 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:54374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguBVajLEzk2WiQ-10WIAAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:29.670434 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.243.203:58064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguCaTCbgAP5jq5TegthQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:36.820651 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:42762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguEP9ocpUE4ed4uDzyRwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:40.252358 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:42772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguFNSswJuvopo3lOhigAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:45.304593 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:60382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguGVajLEzk2WiQ-10WJwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:57.693290 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:60384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguJdSswJuvopo3lOhikAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:22:00.006942 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:35506] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abguKHjZBu2q05ozVU9b2AAAAVA"]
[Mon Mar 16 13:22:08.340485 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguMP9ocpUE4ed4uDzybAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:22:10.872532 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:60050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguMv9ocpUE4ed4uDzycQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:22:13.211473 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:48148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguNY6lpbStxTqkSktvowAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:23:52.591436 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:57832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgumKTCbgAP5jq5TegtuwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:24:09.231274 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.244.31:45066] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abguqXjZBu2q05ozVU9cFQAAAUI"]
[Mon Mar 16 13:24:42.744275 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguyqQpVkWug9HeOt85SAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:24:54.273635 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:53674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu1qQpVkWug9HeOt85XgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:00.096019 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:56220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu3Jqj1wV0Si-OkefyPAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:08.315405 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:41218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu5I6lpbStxTqkSktvrwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:14.776473 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:41230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu6v9ocpUE4ed4uDzzIwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:17.186982 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:42588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu7Zqj1wV0Si-OkefyQQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:18.554904 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:42602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu7rABkC4fWIHEf8HuygAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:20.870172 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:42604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu8KTCbgAP5jq5Tegt4wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:25.113474 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:59834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu9f9ocpUE4ed4uDzzJgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:29.769313 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:39662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu-aTCbgAP5jq5Tegt7QAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:32.308272 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:50692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_KTCbgAP5jq5Tegt7wAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:33.541505 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:50702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_dSswJuvopo3lOhisAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:35.021668 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:59848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_7ABkC4fWIHEf8Hu2gAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:42.540424 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:39240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvBrABkC4fWIHEf8Hu8gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:26:52.639771 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:50716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvTLABkC4fWIHEf8HveAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 13:26:55.133437 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:37914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvT6QpVkWug9HeOt85gQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:27:02.245024 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:53046] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgvVrABkC4fWIHEf8HvgQAAAEg"]
[Mon Mar 16 13:28:37.008833 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:37920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvtY6lpbStxTqkSktwGAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:29:11.408989 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.244.31:51032] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgv15qj1wV0Si-Okefy4wAAAAQ"]
[Mon Mar 16 13:29:11.890934 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:46782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgv15qj1wV0Si-Okefy5AAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:30:16.324378 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:54504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwF46lpbStxTqkSktwVAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:30:22.038481 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:60022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwHrysWC90G-1nBrBIawAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:32:01.504151 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwgbABkC4fWIHEf8HwVgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:02.697924 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.228.16:41478] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgwgqTCbgAP5jq5TeguOwAAAsQ"]
[Mon Mar 16 13:32:02.859451 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:37050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwglajLEzk2WiQ-10WfQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:04.172240 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:37052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwhKQpVkWug9HeOt86DgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:05.701993 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:37060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwhbysWC90G-1nBrBIhQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:10.346622 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:37070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwirysWC90G-1nBrBIiwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:12.988308 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:33502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwjNSswJuvopo3lOhjqQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:14.306900 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:33504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwjrysWC90G-1nBrBIjAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:22.563248 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:36644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwlqQpVkWug9HeOt86FQAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:32:27.614221 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwm5qj1wV0Si-OkefzEQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:28.902289 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:54970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwnKQpVkWug9HeOt86FwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:30.042165 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:41388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwntSswJuvopo3lOhjqwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:32.903477 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwoHjZBu2q05ozVU9cVwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:35.115388 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:41402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwolajLEzk2WiQ-10WgQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:41.963285 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:41408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwqXjZBu2q05ozVU9cXQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:43.245359 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:44612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwq6TCbgAP5jq5TeguTQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:44.573441 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:44614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwrP9ocpUE4ed4uDzzxgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:45.796909 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:44626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwrVajLEzk2WiQ-10WggAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:47.141261 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:44632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwr46lpbStxTqkSktwbQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:48.354090 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:44638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsNSswJuvopo3lOhjrAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:49.681034 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:44642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsZqj1wV0Si-OkefzJwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:50.999095 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:58722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsrABkC4fWIHEf8HweAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:52.215138 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:58736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwtLABkC4fWIHEf8HweQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:54.605241 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:58744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwttSswJuvopo3lOhjrwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:55.996138 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:58754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwt46lpbStxTqkSktwbwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:57.318331 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwubysWC90G-1nBrBIrQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:58.427359 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:58770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwurysWC90G-1nBrBIrwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:59.742092 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwu46lpbStxTqkSktwcAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:02.024191 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:33366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwvo6lpbStxTqkSktwcgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:03.619936 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:33378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwv6QpVkWug9HeOt86GwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:04.974949 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:33380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwwKQpVkWug9HeOt86HQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:06.310905 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwwlajLEzk2WiQ-10WhQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:08.470876 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:33410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgww5qj1wV0Si-OkefzOAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:16.384710 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:33426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwzKQpVkWug9HeOt86JwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:17.745057 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:36670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwzbABkC4fWIHEf8HwggAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:27.837079 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:36672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgw1rysWC90G-1nBrBI0AAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:00.639720 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:43948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgw-I6lpbStxTqkSktwkgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:13.838817 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.244.31:46052] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgxBdSswJuvopo3lOhjugAAAIc"]
[Mon Mar 16 13:34:54.123387 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:41662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxLv9ocpUE4ed4uDz0DgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:56.537605 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:36558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxMLABkC4fWIHEf8HwoAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:57.938372 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:36570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxMbABkC4fWIHEf8HwoQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:59.262358 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:36586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxM6QpVkWug9HeOt86VwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:35:03.631530 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:51494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxN6QpVkWug9HeOt86XQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:18.937887 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:44554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxgpqj1wV0Si-OkefzxQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:20.239440 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxhI6lpbStxTqkSktwngAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:23.609320 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:39126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxh5qj1wV0Si-OkefzzQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:36:26.139819 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:39136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxinjZBu2q05ozVU9c1QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:27.513826 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:39148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxi7ABkC4fWIHEf8HwtgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:28.892536 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:51854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxjLysWC90G-1nBrBJFgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:33.314994 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:51856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxkaTCbgAP5jq5TeguagAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:36:34.642128 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:51858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxkqTCbgAP5jq5TegubAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:37:03.085656 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.228.16:54462] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgxr7ABkC4fWIHEf8HwwQAAAEQ"]
[Mon Mar 16 13:37:27.255359 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:51868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxx3jZBu2q05ozVU9dIgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:39:14.729668 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:46392] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgyMrABkC4fWIHEf8HxPQAAAEI"]
[Mon Mar 16 13:40:36.397811 2026] [mime_magic:error] [pid 14895:tid 140411708356352] (70014)End of file found: [client 74.7.241.46:38468] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root
[Mon Mar 16 13:42:03.206869 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.228.16:54192] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgy23jZBu2q05ozVU9dSwAAAVc"]
[Mon Mar 16 13:42:15.975380 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:58926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy546lpbStxTqkSktxzAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:17.324763 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:55246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy6aTCbgAP5jq5TegvigAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:18.492920 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:57982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy6rABkC4fWIHEf8HxaAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:21.940214 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:57992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy7bABkC4fWIHEf8HxawAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:24.311583 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:57996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy8FajLEzk2WiQ-10XAwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:25.561601 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:58006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy8Zqj1wV0Si-Okef0gAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:34.728004 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:58012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy-lajLEzk2WiQ-10XDgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:40.635875 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:60800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzAHjZBu2q05ozVU9dVAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:52.792163 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:57128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzDNSswJuvopo3lOhkFQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:43:43.543482 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:60788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzP6TCbgAP5jq5TegvxwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:21.951539 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:45552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzoaTCbgAP5jq5TegwLAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:25.095817 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:51558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzpbABkC4fWIHEf8HyOgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:51.588139 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:45750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzv3jZBu2q05ozVU9dsQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:54.211383 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:52126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzwlajLEzk2WiQ-10XLQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:56.795529 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:52128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzxFajLEzk2WiQ-10XMAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:03.506393 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:52142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzy46lpbStxTqkSktyQQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:37.895916 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz7aTCbgAP5jq5TegwWQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:39.253504 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:55766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz76QpVkWug9HeOt87CwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:40.458955 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:41286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz8NSswJuvopo3lOhkjAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:41.795269 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:41294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz8aQpVkWug9HeOt87DAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:43.862955 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:51560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz89SswJuvopo3lOhkkAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:44.094135 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:41300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz9NSswJuvopo3lOhkkQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:46.409088 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:41308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz9Y6lpbStxTqkSktyRQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:47.764180 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:41316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz96QpVkWug9HeOt87DgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:49.845013 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:41332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz-dSswJuvopo3lOhkkgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:53.421356 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:50704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz_XjZBu2q05ozVU9duAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:54.771222 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:50712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz_qTCbgAP5jq5TegwWwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:56.132005 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:50726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AKTCbgAP5jq5TegwXAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:57.447621 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:50728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AdSswJuvopo3lOhklgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:58.725186 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:50736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AnjZBu2q05ozVU9dugAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:00.140830 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:50748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0BNSswJuvopo3lOhklwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:02.603786 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.243.203:54980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0BqTCbgAP5jq5TegwYAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:03.914077 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:54996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0B9SswJuvopo3lOhkmQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:04.535897 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.228.16:53338] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg0CI6lpbStxTqkSktySAAAAk4"]
[Mon Mar 16 13:47:05.276913 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0CY6lpbStxTqkSktySQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:07.954892 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:55000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0CrysWC90G-1nBrBJ9AAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:10.312347 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:55012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0DXjZBu2q05ozVU9dvQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:13.797408 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Ef9ocpUE4ed4uDz0iAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:17.206295 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:41002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0FdSswJuvopo3lOhkngAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:19.616236 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:41018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0F1ajLEzk2WiQ-10XPQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:20.947078 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0GP9ocpUE4ed4uDz0kgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:23.242959 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:55292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Gpqj1wV0Si-Okef0xQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:24.656265 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:55306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0HKTCbgAP5jq5TegwZwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:27.091325 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:55318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0H9SswJuvopo3lOhkoAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:28.425402 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:55330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0INSswJuvopo3lOhkoQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:29.639744 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:55334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0IVajLEzk2WiQ-10XQAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:32.010229 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:45094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0JLABkC4fWIHEf8HyqQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:35.388059 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:45104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0J_9ocpUE4ed4uDz0mQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:36.730633 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:45106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0KP9ocpUE4ed4uDz0mgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:37.868350 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:45120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0KbABkC4fWIHEf8HysgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:39.159147 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:45122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0K9SswJuvopo3lOhkpQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:40.468077 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0LP9ocpUE4ed4uDz0mwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:41.864628 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:37858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0LaTCbgAP5jq5TegwaQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:44.362982 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:37874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0MP9ocpUE4ed4uDz0ngAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:45.691762 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:37888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Mf9ocpUE4ed4uDz0oQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:50.584070 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:37904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0NlajLEzk2WiQ-10XSgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:51.885776 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:45172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0N7ABkC4fWIHEf8HyzwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:53.031210 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:45178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0OaTCbgAP5jq5TegwbAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:54.228150 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:45192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Ov9ocpUE4ed4uDz0pAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:55.558826 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:45196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0O1ajLEzk2WiQ-10XTgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:58.065232 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:45210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Pv9ocpUE4ed4uDz0qAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:59.378796 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:45220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0P5qj1wV0Si-Okef0yQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:07.491167 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:45666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0R6TCbgAP5jq5TegwjgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:08.807904 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:45682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0SHjZBu2q05ozVU9d0QAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:10.167379 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:35660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0SnjZBu2q05ozVU9d1AAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:20.314873 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:35674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0U5qj1wV0Si-Okef02AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:29.807579 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:60258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0XXjZBu2q05ozVU9d3gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:50.013037 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:38840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0cpqj1wV0Si-Okef07wAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:51.251627 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:37616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0c6QpVkWug9HeOt87LAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:01.500680 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:37624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0fVajLEzk2WiQ-10XbAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:04.593312 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:38488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0gHjZBu2q05ozVU9d4gAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:05.883802 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0gbysWC90G-1nBrBKXQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:13.864797 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:38500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0idSswJuvopo3lOhk5gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:18.766340 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:51936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg0jtSswJuvopo3lOhk6wAAAIo"]
[Mon Mar 16 13:49:18.880795 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:39184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0jtSswJuvopo3lOhk7AAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:58.935265 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:33220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0to6lpbStxTqkSktyggAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:01.677603 2026] [access_compat:error] [pid 21805:tid 140411582465792] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fyiiz.php
[Mon Mar 16 13:50:01.850914 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/web.php
[Mon Mar 16 13:50:02.052481 2026] [access_compat:error] [pid 21805:tid 140411540502272] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dragonshell.php
[Mon Mar 16 13:50:02.231050 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/to.php
[Mon Mar 16 13:50:02.391608 2026] [access_compat:error] [pid 21805:tid 140411733534464] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xc0252.php
[Mon Mar 16 13:50:03.078725 2026] [access_compat:error] [pid 15568:tid 140411574073088] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/595.php
[Mon Mar 16 13:50:03.122932 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:46258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0u6QpVkWug9HeOt87XQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:50:03.227492 2026] [access_compat:error] [pid 15568:tid 140411725141760] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/webadmin.php
[Mon Mar 16 13:50:03.356773 2026] [access_compat:error] [pid 15568:tid 140411733534464] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/x1.php
[Mon Mar 16 13:50:03.487897 2026] [access_compat:error] [pid 15568:tid 140411540502272] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0.php
[Mon Mar 16 13:50:03.630484 2026] [access_compat:error] [pid 15568:tid 140411691570944] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/scbpb.php
[Mon Mar 16 13:50:03.935100 2026] [access_compat:error] [pid 10772:tid 140411666392832] [client 20.151.2.242:59620] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yaiid.php
[Mon Mar 16 13:50:04.843216 2026] [access_compat:error] [pid 14895:tid 140411725141760] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ta0ol.php
[Mon Mar 16 13:50:04.982557 2026] [access_compat:error] [pid 14895:tid 140411574073088] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v3.php
[Mon Mar 16 13:50:05.128798 2026] [access_compat:error] [pid 14895:tid 140411658000128] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xvs.php
[Mon Mar 16 13:50:05.282652 2026] [access_compat:error] [pid 14895:tid 140411649607424] [client 20.151.2.242:59644] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fss.php
[Mon Mar 16 13:50:05.756338 2026] [access_compat:error] [pid 21805:tid 140411565680384] [client 20.151.2.242:59658] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xwx1.php
[Mon Mar 16 13:50:05.890767 2026] [access_compat:error] [pid 14895:tid 140411674785536] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Mon Mar 16 13:50:06.037332 2026] [access_compat:error] [pid 14895:tid 140411590858496] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ass.php
[Mon Mar 16 13:50:06.179106 2026] [access_compat:error] [pid 14895:tid 140411616036608] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gkl.php
[Mon Mar 16 13:50:06.316655 2026] [access_compat:error] [pid 21533:tid 140411548894976] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wps.php
[Mon Mar 16 13:50:06.448958 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/flower.php
[Mon Mar 16 13:50:06.582310 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yifsx.php
[Mon Mar 16 13:50:06.629095 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:56034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0vv9ocpUE4ed4uDz0zgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:06.723310 2026] [access_compat:error] [pid 21533:tid 140411683178240] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ng.php
[Mon Mar 16 13:50:06.856796 2026] [access_compat:error] [pid 21533:tid 140411582465792] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/app.php
[Mon Mar 16 13:50:06.998632 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sw.php
[Mon Mar 16 13:50:07.132388 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vfr.php
[Mon Mar 16 13:50:07.283126 2026] [access_compat:error] [pid 21533:tid 140411616036608] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wgift1.php
[Mon Mar 16 13:50:07.413097 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/torsa1.php
[Mon Mar 16 13:50:07.542339 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/zogy1.php
[Mon Mar 16 13:50:07.690381 2026] [access_compat:error] [pid 21533:tid 140411708356352] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/zoper1.php
[Mon Mar 16 13:50:09.477527 2026] [access_compat:error] [pid 21533:tid 140411691570944] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/maint/Jcrop.php
[Mon Mar 16 13:50:09.635126 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Mon Mar 16 13:50:09.763694 2026] [access_compat:error] [pid 21533:tid 140411599251200] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/acjsn.php
[Mon Mar 16 13:50:09.898352 2026] [access_compat:error] [pid 21533:tid 140411666392832] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adnks.php
[Mon Mar 16 13:50:10.034787 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ahiqq.php
[Mon Mar 16 13:50:10.171190 2026] [access_compat:error] [pid 21533:tid 140411649607424] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/tool.php
[Mon Mar 16 13:50:10.799507 2026] [access_compat:error] [pid 21533:tid 140411733534464] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/an9.php
[Mon Mar 16 13:50:10.937325 2026] [access_compat:error] [pid 21533:tid 140411574073088] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aqups.php
[Mon Mar 16 13:50:11.066847 2026] [access_compat:error] [pid 21533:tid 140411741927168] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bpltp.php
[Mon Mar 16 13:50:11.222997 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/byp9.php
[Mon Mar 16 13:50:11.406299 2026] [access_compat:error] [pid 21533:tid 140411716749056] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fs9.php
[Mon Mar 16 13:50:11.567631 2026] [access_compat:error] [pid 21805:tid 140411666392832] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/genco.php
[Mon Mar 16 13:50:11.699342 2026] [access_compat:error] [pid 21805:tid 140411616036608] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/p23duw.php
[Mon Mar 16 13:50:11.832618 2026] [access_compat:error] [pid 21805:tid 140411658000128] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pu9.php
[Mon Mar 16 13:50:11.964679 2026] [access_compat:error] [pid 21805:tid 140411624429312] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pu8.php
[Mon Mar 16 13:50:12.095221 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Mon Mar 16 13:50:12.227769 2026] [access_compat:error] [pid 21805:tid 140411540502272] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aee.php
[Mon Mar 16 13:50:13.001114 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:56040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0xLABkC4fWIHEf8HzcAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:13.244406 2026] [access_compat:error] [pid 10772:tid 140411540502272] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/nc4.php
[Mon Mar 16 13:50:13.393506 2026] [access_compat:error] [pid 10772:tid 140411708356352] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vaza.php
[Mon Mar 16 13:50:13.540070 2026] [access_compat:error] [pid 10772:tid 140411565680384] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Mon Mar 16 13:50:13.677063 2026] [access_compat:error] [pid 10772:tid 140411548894976] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp9.php
[Mon Mar 16 13:50:13.823966 2026] [access_compat:error] [pid 10772:tid 140411733534464] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/4pocjn.php
[Mon Mar 16 13:50:13.973951 2026] [access_compat:error] [pid 10772:tid 140411574073088] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vir-v2.php
[Mon Mar 16 13:50:14.103841 2026] [access_compat:error] [pid 10772:tid 140411632822016] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gm.php
[Mon Mar 16 13:50:14.254310 2026] [access_compat:error] [pid 10772:tid 140411683178240] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/btx25.php
[Mon Mar 16 13:50:14.386018 2026] [access_compat:error] [pid 10772:tid 140411725141760] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v4.php
[Mon Mar 16 13:50:14.519173 2026] [access_compat:error] [pid 10772:tid 140411599251200] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v2.php
[Mon Mar 16 13:50:14.676675 2026] [access_compat:error] [pid 10772:tid 140411658000128] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Mon Mar 16 13:50:14.827617 2026] [access_compat:error] [pid 10772:tid 140411699963648] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wander.php
[Mon Mar 16 13:50:14.968018 2026] [access_compat:error] [pid 10772:tid 140411674785536] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/amax.php
[Mon Mar 16 13:50:15.103390 2026] [access_compat:error] [pid 10772:tid 140411741927168] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hckpe.php
[Mon Mar 16 13:50:15.243310 2026] [access_compat:error] [pid 10772:tid 140411624429312] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ht.php
[Mon Mar 16 13:50:15.394855 2026] [access_compat:error] [pid 10772:tid 140411557287680] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sd.php
[Mon Mar 16 13:50:15.599410 2026] [access_compat:error] [pid 10772:tid 140411590858496] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/blog.php
[Mon Mar 16 13:50:15.749995 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/maint/max.php
[Mon Mar 16 13:52:04.695866 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.228.16:37908] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg1NKQpVkWug9HeOt87cgAAA00"]
[Mon Mar 16 13:52:09.532354 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:54504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1OaQpVkWug9HeOt87fQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:52:10.914776 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:49890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1OrysWC90G-1nBrBKdwAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:52:24.740129 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1SLABkC4fWIHEf8H0JgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:53:52.220623 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:55444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1oFajLEzk2WiQ-10YVAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:10.759456 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:49900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1sv9ocpUE4ed4uDz1gwAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:19.305682 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.244.31:53096] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg1u6QpVkWug9HeOt87ogAAA08"]
[Mon Mar 16 13:54:19.331558 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:50160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1u46lpbStxTqkSktyvwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:25.308593 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1wbysWC90G-1nBrBKogAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:30.135578 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:59230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1xpqj1wV0Si-Okef1RQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:31.482371 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:38084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1x1ajLEzk2WiQ-10YXgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:33.551335 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1yKTCbgAP5jq5Tegw_AAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:35.051964 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:38102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1y5qj1wV0Si-Okef1SQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:38.460708 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:38106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1zY6lpbStxTqkSktyxQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:39.798985 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:48558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1z9SswJuvopo3lOhlNQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:40.994665 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:48564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg10HjZBu2q05ozVU9evAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:42.260184 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:48570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg10lajLEzk2WiQ-10YZAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:43.475633 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:48576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg107ysWC90G-1nBrBKrAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:44.650172 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:48584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg11LysWC90G-1nBrBKrgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:45.962638 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:48598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg11bysWC90G-1nBrBKsQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:49.431346 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:48614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg12Zqj1wV0Si-Okef1TwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:50.718822 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:41220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg12qQpVkWug9HeOt87sQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:51.930045 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:41234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg129SswJuvopo3lOhlOAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:53.297084 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:41250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg13Y6lpbStxTqkSktyygAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:54.495050 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:41252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg13tSswJuvopo3lOhlOgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:57.931053 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg14VajLEzk2WiQ-10YaQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:01.444665 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:49716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg15f9ocpUE4ed4uDz1swAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:20.997667 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:49732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1-FajLEzk2WiQ-10YfQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:24.398136 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:42052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1_P9ocpUE4ed4uDz1zgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:56:13.230902 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:42054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2LXjZBu2q05ozVU9fLgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:56:41.493332 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2SbABkC4fWIHEf8H0kAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:02.424986 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:52658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Xo6lpbStxTqkSktzDwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:03.767711 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:56102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2X_9ocpUE4ed4uDz2AQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:05.154815 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:49962] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg2YdSswJuvopo3lOhlWAAAAI4"]
[Mon Mar 16 13:57:06.241559 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:56110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2YqQpVkWug9HeOt870AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:07.131556 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.243.203:35224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Y1ajLEzk2WiQ-10YuwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:07.634623 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:56114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Y6TCbgAP5jq5TegxLAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:08.850422 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ZLABkC4fWIHEf8H0mAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:10.211325 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:39080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ZrysWC90G-1nBrBK-AAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:12.603242 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:39094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2aKQpVkWug9HeOt870gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:13.954429 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:39110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2adSswJuvopo3lOhlWwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:15.143974 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2a7ABkC4fWIHEf8H0mgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:16.562200 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:39122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2bKQpVkWug9HeOt871QAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:17.927062 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:39134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2bf9ocpUE4ed4uDz2CAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:19.306712 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:51670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2b6TCbgAP5jq5TegxLgAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:20.659806 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:51676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2cNSswJuvopo3lOhlXgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:21.903568 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:51688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2cXjZBu2q05ozVU9fPQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:24.483706 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:51696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2dLysWC90G-1nBrBLEQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:28.207582 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:51698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2eKTCbgAP5jq5TegxNgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:29.594950 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:59860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2eaTCbgAP5jq5TegxOQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:30.956575 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:59864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ev9ocpUE4ed4uDz2DQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:32.335275 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:59878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2fHjZBu2q05ozVU9fQQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:34.959475 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:59890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2faTCbgAP5jq5TegxPQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:36.403353 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:59900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2gHjZBu2q05ozVU9fQwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:37.639835 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:59912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2gbysWC90G-1nBrBLJwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:39.060022 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:59416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2g3jZBu2q05ozVU9fRQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:12.232738 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2pLysWC90G-1nBrBLZgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:39.100381 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:44104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2v1ajLEzk2WiQ-10Y5wAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:55.556170 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:59428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2z3jZBu2q05ozVU9fmwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:59:20.107039 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.244.31:36668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg26Jqj1wV0Si-Okef1twAAAA0"]
[Mon Mar 16 13:59:24.405858 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:37096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg27Jqj1wV0Si-Okef1vwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:04.001759 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:50700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3EbysWC90G-1nBrBLsAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:29.238115 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:54156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3LaQpVkWug9HeOt88GgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:44.819414 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:40850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3PKQpVkWug9HeOt88KgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:45.743044 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:38324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3PaQpVkWug9HeOt88LQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:49.697803 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:38328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3QaTCbgAP5jq5TegxiQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:51.048294 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:51596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Q6QpVkWug9HeOt88LgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:51.943935 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:34234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Q7ABkC4fWIHEf8H1cAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:52.380446 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:51600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3RI6lpbStxTqkSktzSwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:53.759518 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:51610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3RZqj1wV0Si-Okef16gAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:55.155679 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:51622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3R1ajLEzk2WiQ-10ZGgAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:57.571757 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:51636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3SdSswJuvopo3lOhlrQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:58.871903 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:51648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3So6lpbStxTqkSktzTAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:00.216812 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:54478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3TJqj1wV0Si-Okef17QAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:01.956914 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.243.203:54492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3TaTCbgAP5jq5TegxlwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:03.489632 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:54494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3T5qj1wV0Si-Okef17wAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:04.853613 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:54510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3UNSswJuvopo3lOhlrwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:06.118025 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:54522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Uo6lpbStxTqkSktzTwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:07.476114 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3U3jZBu2q05ozVU9gBwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:08.984559 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:54538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3VFajLEzk2WiQ-10ZIAAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:10.415886 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:54760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3VnjZBu2q05ozVU9gCwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:11.916479 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:54770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3V5qj1wV0Si-Okef18AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:13.262935 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Wf9ocpUE4ed4uDz2TwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:14.526072 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:54780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Wv9ocpUE4ed4uDz2UQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:17.107470 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:54794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3XbysWC90G-1nBrBL1gAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:18.475762 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:54806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Xo6lpbStxTqkSktzUAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:19.695083 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:54818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3X46lpbStxTqkSktzUgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:24.171670 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:54406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3ZJqj1wV0Si-Okef19AAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:25.469824 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:54420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3ZVajLEzk2WiQ-10ZIwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:26.795798 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:54428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Zpqj1wV0Si-Okef19QAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:28.307284 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:54430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3aLysWC90G-1nBrBL2QAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:29.688303 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.243.203:54446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3aVajLEzk2WiQ-10ZJAAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:33.263323 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:46114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3bVajLEzk2WiQ-10ZJwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:34.603338 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:46122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3brABkC4fWIHEf8H1eQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:35.767342 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3b_9ocpUE4ed4uDz2VgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:37.116073 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:46140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3cdSswJuvopo3lOhluwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:39.999681 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:46144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3c7ABkC4fWIHEf8H1fQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:41.312444 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:36410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3dVajLEzk2WiQ-10ZLAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:44.005515 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:36414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3eFajLEzk2WiQ-10ZLwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:45.330291 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:36420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3eVajLEzk2WiQ-10ZMAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:48.724115 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:36432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3fFajLEzk2WiQ-10ZNAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:50.051071 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:36442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3fo6lpbStxTqkSktzXAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:51.664863 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:37786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3f6TCbgAP5jq5TegxzQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:56.272017 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:37794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3hJqj1wV0Si-Okef1_gAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:58.995226 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3hf9ocpUE4ed4uDz2WQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:00.359520 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:57176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3iJqj1wV0Si-Okef1_wAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:05.024486 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:57180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3jZqj1wV0Si-Okef2AwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:06.149339 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.228.16:57358] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg3jtSswJuvopo3lOhlxAAAAIc"]
[Mon Mar 16 14:02:06.260188 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:57182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3jtSswJuvopo3lOhlxQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:07.639448 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:57188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3j5qj1wV0Si-Okef2BgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:08.935478 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:57196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3kHjZBu2q05ozVU9gHgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:10.345142 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:53062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3knjZBu2q05ozVU9gIAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:11.684553 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:53078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3k3jZBu2q05ozVU9gIgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:13.059511 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:53092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3laQpVkWug9HeOt88YgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:14.261935 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:53102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3lv9ocpUE4ed4uDz2WwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:15.564890 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:53106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3l9SswJuvopo3lOhlxwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:16.747530 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:53122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3mKTCbgAP5jq5Tegx5gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:19.244930 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3m7ABkC4fWIHEf8H1jAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:20.587306 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:46722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3nP9ocpUE4ed4uDz2XQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:24.304359 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:46728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3oLABkC4fWIHEf8H1kgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:29.131477 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:46740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3pf9ocpUE4ed4uDz2ZAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:30.475382 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:56566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3plajLEzk2WiQ-10ZPQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:31.865093 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:56572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3p6QpVkWug9HeOt88cQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:42.883963 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:56586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3sv9ocpUE4ed4uDz2bwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:45.329511 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:34008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3tbysWC90G-1nBrBL7AAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:55.566064 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:34018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3v6TCbgAP5jq5TegyEwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:59.225879 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:55658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3w3jZBu2q05ozVU9gKgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:00.614625 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:51382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3xJqj1wV0Si-Okef2DwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:06.398859 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:51390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3yrABkC4fWIHEf8H1qAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:07.731145 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:51396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3y5qj1wV0Si-Okef2EwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:09.016315 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:51402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3zXjZBu2q05ozVU9gLAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:31.989294 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:57968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg345qj1wV0Si-Okef2KQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:34.136813 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:37214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg35Y6lpbStxTqkSktzdQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:35.512283 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:37228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg359SswJuvopo3lOhl1QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:36.870462 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:37234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg36Jqj1wV0Si-Okef2LAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:41.807767 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:37246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg37VajLEzk2WiQ-10ZTQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:45.374841 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:43080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg38aTCbgAP5jq5TegyGwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:47.776714 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:43086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3846lpbStxTqkSktzeAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:49.072249 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:43094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg39Y6lpbStxTqkSktzegAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:54.831279 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3-tSswJuvopo3lOhl4gAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:08.375936 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4CKQpVkWug9HeOt88uwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:09.670982 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:52834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4CaTCbgAP5jq5TegyIgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:13.231708 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:46654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4DaTCbgAP5jq5TegyJwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:20.783168 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:50888] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg4FLABkC4fWIHEf8H1uAAAAE4"]
[Mon Mar 16 14:04:54.446716 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:51860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4No6lpbStxTqkSktziwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:57.538473 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:46664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4OXjZBu2q05ozVU9gYwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:59.831085 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:36690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4O9SswJuvopo3lOhmIAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:01.185573 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:56068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4PaTCbgAP5jq5TegyNAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:02.691368 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:56074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4PlajLEzk2WiQ-10ZZgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:06.959809 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:56084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4QrysWC90G-1nBrBMGQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:07.563446 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:51872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4Q5qj1wV0Si-Okef2SwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:08.283210 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:56098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4RFajLEzk2WiQ-10ZZwAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:10.489286 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:56102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4RY6lpbStxTqkSktzjQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:13.951575 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:54732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4SVajLEzk2WiQ-10ZagAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:15.287654 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4S9SswJuvopo3lOhmKwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:23.675509 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:54750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4U9SswJuvopo3lOhmOwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:26.196024 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4VrABkC4fWIHEf8H12wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:28.570416 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4WLysWC90G-1nBrBMHQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:12.751721 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:39798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4hLABkC4fWIHEf8H2DAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:14.083425 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:51402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4hnjZBu2q05ozVU9gcQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:21.022721 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:51414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4jZqj1wV0Si-Okef2XAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:36.298951 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:58620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4nLABkC4fWIHEf8H2HgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:37.652309 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:42282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4nbysWC90G-1nBrBMKAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:42.075470 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:37880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4ov9ocpUE4ed4uDz3SgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:54.547917 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:42298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4rtSswJuvopo3lOhmeAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:06.219713 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.228.16:41026] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg4ulajLEzk2WiQ-10ZhgAAApU"]
[Mon Mar 16 14:07:18.203466 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:36060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4xv9ocpUE4ed4uDz3YwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:18.239572 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:37030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4xrysWC90G-1nBrBMRwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:19.571404 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:32990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4x6TCbgAP5jq5TegyVgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:26.568969 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:59288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4zv9ocpUE4ed4uDz3bgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:30.455408 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:59298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg40lajLEzk2WiQ-10ZkQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:37.987361 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:38174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg42bABkC4fWIHEf8H2VQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:44.008673 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:56450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg44KTCbgAP5jq5TegyYAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:54.945439 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:58322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg46tSswJuvopo3lOhmjQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:57.409504 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:57134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg47bABkC4fWIHEf8H2cQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:06.159188 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:48462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg49rABkC4fWIHEf8H2eAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:08:14.423261 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:57150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4_njZBu2q05ozVU9glwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:18.099156 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:42014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5ArABkC4fWIHEf8H2fgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:19.401951 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:42030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5A6QpVkWug9HeOt89EwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:21.796832 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:33424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5BXjZBu2q05ozVU9gmgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:34.671770 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:33428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5EqTCbgAP5jq5TegydgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:45.906674 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:45360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5HbABkC4fWIHEf8H2jAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:46.711435 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:54656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5HrysWC90G-1nBrBMcwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:48.455288 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:49350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5IKQpVkWug9HeOt89GwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:12.715863 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:49364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5N7ysWC90G-1nBrBMhwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:17.943424 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:53180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5PaQpVkWug9HeOt89JQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:20.555811 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:51898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5QJqj1wV0Si-Okef2mQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:21.779842 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.244.31:54346] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg5QVajLEzk2WiQ-10ZsgAAApU"]
[Mon Mar 16 14:09:23.892928 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:53190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5Q7ysWC90G-1nBrBMjwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:27.442064 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:53372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5R46lpbStxTqkSkt0GQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:29.790201 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:53380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5SbABkC4fWIHEf8H2oQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:41.082615 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:33126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5VbABkC4fWIHEf8H2rwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:48.669854 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5XI6lpbStxTqkSkt0KwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:11.659117 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:43310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5c46lpbStxTqkSkt0RAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:13.060441 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:40196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5daTCbgAP5jq5TegylQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:17.715271 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:40208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5edSswJuvopo3lOhm3AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:19.115940 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:40216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5e6QpVkWug9HeOt89MgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:23.731260 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:36990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5f5qj1wV0Si-Okef2owAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:37.122421 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:36996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5jXjZBu2q05ozVU9gywAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:52.644702 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:33846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5nKTCbgAP5jq5TegysAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:39.603387 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:53552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5y6TCbgAP5jq5Tegy2wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:44.286482 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:45612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg50LysWC90G-1nBrBMrQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:54.331408 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:45624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg52rysWC90G-1nBrBMuAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:55.639593 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:51738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg52_9ocpUE4ed4uDz4CgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:14.847606 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg57pqj1wV0Si-Okef21gAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:16.412189 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg58HjZBu2q05ozVU9g4QAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:17.648759 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:36020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg58bABkC4fWIHEf8H21wAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:19.010058 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:41340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg586QpVkWug9HeOt89RAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:22.351193 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:41350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg59o6lpbStxTqkSkt0hQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:23.686511 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg59_9ocpUE4ed4uDz4EQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:24.495257 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:51752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-FajLEzk2WiQ-10Z8QAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:25.038140 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:41376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-aTCbgAP5jq5Tegy4AAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:26.205023 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:41388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-rysWC90G-1nBrBMuwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:27.012337 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:56992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-3jZBu2q05ozVU9g5AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:27.472836 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:41394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-1ajLEzk2WiQ-10Z8gAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:28.735568 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:42978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_NSswJuvopo3lOhnKQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:29.507300 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:56998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_bABkC4fWIHEf8H22wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:31.116887 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:42994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_6QpVkWug9HeOt89RwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:32.518615 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:43006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6AJqj1wV0Si-Okef22QAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:33.722331 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:43014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6AZqj1wV0Si-Okef22gAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:35.055894 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:43018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6A1ajLEzk2WiQ-10Z9AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:36.331230 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:43020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6BP9ocpUE4ed4uDz4FQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:37.636577 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:43022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6Bf9ocpUE4ed4uDz4FgAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:38.851666 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:33276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6BtSswJuvopo3lOhnKgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:40.195829 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:33280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6CKQpVkWug9HeOt89SAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:42.417336 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:33292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6CrABkC4fWIHEf8H23gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:43.747036 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:33294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6C3jZBu2q05ozVU9g5wAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:44.922322 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:33310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6DLABkC4fWIHEf8H23wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:46.195270 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6DrABkC4fWIHEf8H24QAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:47.627079 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:55560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6D7ysWC90G-1nBrBMywAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:48.446648 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:33328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6EHjZBu2q05ozVU9g6QAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:54.339524 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:43864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6FqQpVkWug9HeOt89UAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:02.200728 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:46484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6HqTCbgAP5jq5Tegy7QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:02.591509 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:36738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6HtSswJuvopo3lOhnOAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:13:04.526442 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ILysWC90G-1nBrBMzQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:11.321055 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:56216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6J7ABkC4fWIHEf8H26gAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:19.577993 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:52898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6L6QpVkWug9HeOt89WgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:23.127776 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6M7ABkC4fWIHEf8H27gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:40.884509 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:37654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6RHjZBu2q05ozVU9hBwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:51.952879 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:38902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6T5qj1wV0Si-Okef28QAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:55.567426 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:33680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6U5qj1wV0Si-Okef29gAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:14:22.640490 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.244.31:33214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg6blajLEzk2WiQ-10aTgAAAoQ"]
[Mon Mar 16 14:14:24.698549 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:33694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6cKQpVkWug9HeOt89dgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:28.057521 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:49594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6dFajLEzk2WiQ-10aWAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:29.392662 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:49608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ddSswJuvopo3lOhnTAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:30.696439 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:55972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6dqTCbgAP5jq5TegzBAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:31.875624 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:55976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6d6TCbgAP5jq5TegzBQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:34.227440 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:55992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6eo6lpbStxTqkSkt0vwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:35.628530 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:56008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6e3jZBu2q05ozVU9hMgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:39.987448 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:56010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6f9SswJuvopo3lOhnUAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:41.368189 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:41918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6gY6lpbStxTqkSkt0wgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:42.714616 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:41930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6go6lpbStxTqkSkt0wwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:44.075211 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:41946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hP9ocpUE4ed4uDz4OQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:45.398156 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:41948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hdSswJuvopo3lOhnUwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:46.703995 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:41952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hv9ocpUE4ed4uDz4OgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:47.915106 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:41966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6h6QpVkWug9HeOt89ewAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:49.199006 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:41980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6iZqj1wV0Si-Okef3AQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:50.415965 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:59090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6irysWC90G-1nBrBM3gAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:51.782548 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:59098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6i_9ocpUE4ed4uDz4OwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:52.992596 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:59112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jP9ocpUE4ed4uDz4PAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:54.140207 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:59128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jpqj1wV0Si-Okef3AgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:54.900353 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:48192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jlajLEzk2WiQ-10acgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:56.545871 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:59134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6kI6lpbStxTqkSkt0yAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:58.883100 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:59138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6kqTCbgAP5jq5TegzEAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:00.181029 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:52580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lKQpVkWug9HeOt89fgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:00.616431 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:34074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lFajLEzk2WiQ-10aeAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:02.186148 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:55008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lqQpVkWug9HeOt89fwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:02.757068 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:52590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ltSswJuvopo3lOhnVwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:03.364108 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:55018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6l5qj1wV0Si-Okef3BQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:04.045414 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:52602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mI6lpbStxTqkSkt0yQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:04.689057 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:55024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mHjZBu2q05ozVU9hTQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:06.045660 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:55030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mqTCbgAP5jq5TegzEQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:06.232022 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:52618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mrysWC90G-1nBrBM5AAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:07.292223 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6m6TCbgAP5jq5TegzEgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:07.544352 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:52634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6m6TCbgAP5jq5TegzFAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:09.689166 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:56628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6nHjZBu2q05ozVU9hUQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:10.717103 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:52644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6nrABkC4fWIHEf8H3BAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:11.039807 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:56642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6n6TCbgAP5jq5TegzFwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:12.223752 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:56652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6oNSswJuvopo3lOhnWQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:15.346846 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:42398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6o6QpVkWug9HeOt89hgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:16.767352 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:56658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6pKQpVkWug9HeOt89igAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:17.817944 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:42410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6paQpVkWug9HeOt89jAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:18.059168 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:56674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6pqQpVkWug9HeOt89jQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:20.188438 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:42418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qKQpVkWug9HeOt89kgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:20.344660 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:46210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qNSswJuvopo3lOhnXAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:21.695469 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:46218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qf9ocpUE4ed4uDz4QAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:24.002880 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rFajLEzk2WiQ-10afAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:25.325096 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:48056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rbABkC4fWIHEf8H3CAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:25.330108 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:46236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rVajLEzk2WiQ-10afQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:26.662384 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:48060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rrABkC4fWIHEf8H3CQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:27.731202 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6r_9ocpUE4ed4uDz4QwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:28.018713 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:48066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6sLABkC4fWIHEf8H3DQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:29.431365 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6saQpVkWug9HeOt89lQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:30.757019 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:34060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6sqQpVkWug9HeOt89lgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:31.502411 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:45710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6s3jZBu2q05ozVU9hZAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:32.860771 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:45720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6tI6lpbStxTqkSkt0zQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:34.169631 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:34074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ttSswJuvopo3lOhnXwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:38.156224 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:45732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6upqj1wV0Si-Okef3CgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:41.440783 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:34076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vf9ocpUE4ed4uDz4SwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:41.692694 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:60432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vaTCbgAP5jq5TegzHAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:42.848922 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:49116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vrABkC4fWIHEf8H3EAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:44.183794 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:49126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wNSswJuvopo3lOhnZgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:45.573149 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:49142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wVajLEzk2WiQ-10afwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:46.407671 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:60440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wtSswJuvopo3lOhnaAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:47.705440 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:60454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6w6QpVkWug9HeOt89mAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:51.822868 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:49152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6x9SswJuvopo3lOhnbQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:53.263949 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:44192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ydSswJuvopo3lOhncQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:54.586073 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:44202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ytSswJuvopo3lOhncgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:55.912091 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:44216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6y5qj1wV0Si-Okef3DAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:57.249704 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:44220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6zY6lpbStxTqkSkt0zwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:57.911971 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:60944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6zaQpVkWug9HeOt89qQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:58.473065 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:44236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6znjZBu2q05ozVU9hcgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:59.177894 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6z5qj1wV0Si-Okef3DQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:59.792489 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:44246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6z5qj1wV0Si-Okef3DgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:01.122042 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:41018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60bABkC4fWIHEf8H3FAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:02.587769 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:47892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60qTCbgAP5jq5TegzIAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:03.622374 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:41026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60_9ocpUE4ed4uDz4TgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:04.984164 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:41034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg61I6lpbStxTqkSkt00AAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:06.385363 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:41046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg61o6lpbStxTqkSkt00QAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:08.895224 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:47898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg62KQpVkWug9HeOt89tgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:09.880712 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:41054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg62VajLEzk2WiQ-10ahAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:11.260751 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:34084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg626TCbgAP5jq5TegzIwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:12.356007 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:45208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63KTCbgAP5jq5TegzJQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:13.466298 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:34092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63VajLEzk2WiQ-10ahgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:14.847947 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:34096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63qQpVkWug9HeOt89vQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:16.203793 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:34098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg64NSswJuvopo3lOhndAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:17.525476 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:34106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg64bysWC90G-1nBrBM7gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:22.830290 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:34116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg65pqj1wV0Si-Okef3EgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:29.135585 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:34810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg67aQpVkWug9HeOt89zgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:30.560179 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:34748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg67rysWC90G-1nBrBM8gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:31.945632 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:34764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg677ysWC90G-1nBrBM8wAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:33.346097 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:34780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg68dSswJuvopo3lOhndQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:35.875897 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:34790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg685qj1wV0Si-Okef3FAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:37.199991 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg69XjZBu2q05ozVU9hdgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:38.536880 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:34808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg69njZBu2q05ozVU9hdwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:41.049016 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:34812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6-f9ocpUE4ed4uDz4UwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:42.414612 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:54934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6-v9ocpUE4ed4uDz4VAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:48.366793 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:54940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7AI6lpbStxTqkSkt02wAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:51.976381 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7A_9ocpUE4ed4uDz4VwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:17:01.128846 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:45222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7DVajLEzk2WiQ-10aswAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:17:26.506847 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:47046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7JqTCbgAP5jq5TegzYQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:17:28.963328 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7KP9ocpUE4ed4uDz4WwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:18:47.188189 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:41018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7d6TCbgAP5jq5TegzsAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:13.348077 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:49964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7kaTCbgAP5jq5Tegz0AAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:14.707908 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:54688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7kqQpVkWug9HeOt8-HwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:17.000105 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7k46lpbStxTqkSkt05wAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:18.459694 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:40836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7lv9ocpUE4ed4uDz4bQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:19.850550 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:40842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7l7ABkC4fWIHEf8H3iQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:21.759329 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:45252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7mbABkC4fWIHEf8H3jAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:22.325808 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:40854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7mv9ocpUE4ed4uDz4bwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:23.101387 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.243.203:42654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7m1ajLEzk2WiQ-10awAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:24.498375 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:42660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nI6lpbStxTqkSkt06AAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:26.800938 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:42674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nrysWC90G-1nBrBNDAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:26.865380 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:40868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nrysWC90G-1nBrBNDQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:29.562588 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7oVajLEzk2WiQ-10axAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:30.906222 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:46302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7oqTCbgAP5jq5Tegz0wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:32.098633 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7pLysWC90G-1nBrBNDgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:35.199339 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:42676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7p9SswJuvopo3lOhnkAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:35.919515 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:46320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7p5qj1wV0Si-Okef3JAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:39.022491 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:46334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7qpqj1wV0Si-Okef3JgAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:39.023276 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:53834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7q46lpbStxTqkSkt07QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:40.342467 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:45686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rI6lpbStxTqkSkt07gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:41.420853 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:35182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rbysWC90G-1nBrBNEQAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:41.571724 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:45698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rbABkC4fWIHEf8H3jwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:45.811012 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:45714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7sZqj1wV0Si-Okef3LgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:47.206220 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7s_9ocpUE4ed4uDz4cgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:52.932618 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:51814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7uJqj1wV0Si-Okef3OQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:21.715037 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:51826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg71aTCbgAP5jq5Tegz8QAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:20:29.564627 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:43520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg73VajLEzk2WiQ-10azgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:30.924512 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:40438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg73qQpVkWug9HeOt8-JQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:32.122350 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:40446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74LABkC4fWIHEf8H3mQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:33.331798 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:40460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74bABkC4fWIHEf8H3mwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:34.672113 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:40468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74rABkC4fWIHEf8H3nAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:38.128619 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:40478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg75njZBu2q05ozVU9h7gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:47.349558 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7746lpbStxTqkSkt0_wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:49.698388 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:52478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg78aTCbgAP5jq5Tegz9QAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:49.947696 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:35196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg78Zqj1wV0Si-Okef3bwAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:52.083016 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:52490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79I6lpbStxTqkSkt1AgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:53.412335 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:52500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79VajLEzk2WiQ-10a0wAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:53.526135 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:43868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79f9ocpUE4ed4uDz4fAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:56.823587 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:52516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-FajLEzk2WiQ-10a2QAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:57.713334 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:43882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-aTCbgAP5jq5Tegz-AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:20:58.217074 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:59314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-rysWC90G-1nBrBNGAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:59.474214 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:59324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-_9ocpUE4ed4uDz4fgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:01.727317 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:59334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7_aTCbgAP5jq5Tegz-wAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:06.151289 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:59336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8AtSswJuvopo3lOhnxQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:08.587645 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:59340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8BNSswJuvopo3lOhnyQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:10.037927 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:41234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8BqTCbgAP5jq5Tegz_AAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:11.373089 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:41246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8B5qj1wV0Si-Okef3cQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:12.557472 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:41256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8CKQpVkWug9HeOt8-KwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:13.847958 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:41258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8CaQpVkWug9HeOt8-LAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:15.027003 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:41270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8C7ysWC90G-1nBrBNGwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:17.259622 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:43892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8DY6lpbStxTqkSkt1EgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:18.357854 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:41284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8DqTCbgAP5jq5Tegz_gAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:20.649198 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:57042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8ELysWC90G-1nBrBNHgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:23.079161 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:57050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8E5qj1wV0Si-Okef3dQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:37.939537 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8If9ocpUE4ed4uDz4lAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:21:39.290914 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:55708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8I6TCbgAP5jq5Teg0BAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:43.183208 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:37384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8J7ysWC90G-1nBrBNJQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:22:01.451251 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:37394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8ObABkC4fWIHEf8H31AAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:22:05.963430 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8PbABkC4fWIHEf8H33gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:22:08.125458 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.228.16:37040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg8QKTCbgAP5jq5Teg0CAAAAtM"]
[Mon Mar 16 14:22:55.091098 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8b7ABkC4fWIHEf8H4DQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:23:28.366712 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:48384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8kLysWC90G-1nBrBNUgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:23:31.972469 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:48590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8k_9ocpUE4ed4uDz4pQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:17.080353 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8wY6lpbStxTqkSkt1MQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:19.334343 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:48592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8w6QpVkWug9HeOt8-wgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:21.799392 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:57802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8xVajLEzk2WiQ-10a-gAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:23.799122 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:56008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg8x9SswJuvopo3lOhoIgAAAJg"]
[Mon Mar 16 14:24:27.485816 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:60358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8y9SswJuvopo3lOhoJgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:35.676371 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:60372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8046lpbStxTqkSkt1RgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:36.984855 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:51360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg81HjZBu2q05ozVU9iDQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:43.749291 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg827ysWC90G-1nBrBNXgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:47.035064 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8346lpbStxTqkSkt1UQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:24:48.378609 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:41048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84FajLEzk2WiQ-10bBQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:49.385624 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:60764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84VajLEzk2WiQ-10bBgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:50.679750 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:41064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84lajLEzk2WiQ-10bCgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:24:52.782948 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:40266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg85HjZBu2q05ozVU9iEAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:00.932827 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:40274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg87LABkC4fWIHEf8H4HwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:03.561789 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:44506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg873jZBu2q05ozVU9iEwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:13.163904 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:41068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8-dSswJuvopo3lOhoOwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:25:27.699986 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:44518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9B6TCbgAP5jq5Teg0VQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:32.199121 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:33222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9DP9ocpUE4ed4uDz4vwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:35.587634 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:34358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9D46lpbStxTqkSkt1WQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:36.031023 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:47746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9EKTCbgAP5jq5Teg0XQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:38.023385 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:34366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9Eo6lpbStxTqkSkt1WwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:41.492904 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:34382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9FdSswJuvopo3lOhoRwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:56.779950 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:44250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9JLABkC4fWIHEf8H4QwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:32.663949 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:46952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9SFajLEzk2WiQ-10bfQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:36.738261 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:59254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9TLABkC4fWIHEf8H4cwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:26:44.440425 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:39846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9VHjZBu2q05ozVU9iLAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:46.492519 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:56350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9VrABkC4fWIHEf8H4gAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:50.083752 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:33210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9WrysWC90G-1nBrBNbAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:27:08.516053 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.228.16:42656] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg9bFajLEzk2WiQ-10bmAAAAoc"]
[Mon Mar 16 14:27:16.962933 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:38792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9dI6lpbStxTqkSkt1hAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:27:29.619160 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:33196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9gbysWC90G-1nBrBNjQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:27:36.016635 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:36428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9iKTCbgAP5jq5Teg0gwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:27:37.363335 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:38978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9iaTCbgAP5jq5Teg0hAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:07.271767 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:38982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9p6TCbgAP5jq5Teg0pAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:09.570962 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:33450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9qbABkC4fWIHEf8H4iQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:11.888790 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:45866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9q7ABkC4fWIHEf8H4iwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:13.245019 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:45882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9rY6lpbStxTqkSkt1iAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:20.443730 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:45898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9tFajLEzk2WiQ-10bogAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:22.811971 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:57548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9tv9ocpUE4ed4uDz40wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:25.179910 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:57560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9ubABkC4fWIHEf8H4jQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:37.999678 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:57566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9xf9ocpUE4ed4uDz43gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:40.314165 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:37530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9yKTCbgAP5jq5Teg0qAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:41.633962 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:43590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9ybysWC90G-1nBrBNkgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:49.347419 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:43602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg90Y6lpbStxTqkSkt1kAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:50.649580 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:59328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg90njZBu2q05ozVU9ieQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:28:51.813923 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:53002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg905qj1wV0Si-Okef3_gAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:53.184109 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:53018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg91VajLEzk2WiQ-10bqAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:56.731567 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:53022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg92LysWC90G-1nBrBNmAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:59.042297 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg923jZBu2q05ozVU9ifAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:00.383171 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:46334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg93I6lpbStxTqkSkt1kgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:10.542687 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:46340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg95pqj1wV0Si-Okef4BwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:11.847700 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:57676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg956TCbgAP5jq5Teg0swAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:16.515434 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:57684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg97LABkC4fWIHEf8H4mgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:23.797114 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.244.31:43236] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg983jZBu2q05ozVU9ifwAAAUE"]
[Mon Mar 16 14:29:30.075370 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:57690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9-lajLEzk2WiQ-10btwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:34.720423 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:42452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9_tSswJuvopo3lOhoggAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:39.768880 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:42468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-A7ysWC90G-1nBrBNogAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:42.147660 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:39558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-BlajLEzk2WiQ-10buQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:43.461268 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:39578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-B6QpVkWug9HeOt8_SAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:44.633953 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:39584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-CI6lpbStxTqkSkt1lQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:44.896095 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:41956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-CNSswJuvopo3lOhojQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:47.306104 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:39592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-C6QpVkWug9HeOt8_UAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:48.347545 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DKQpVkWug9HeOt8_UQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:49.615954 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:48890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DbABkC4fWIHEf8H4mwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:49.707741 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DY6lpbStxTqkSkt1mAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:50.821956 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:48904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Dpqj1wV0Si-Okef4EAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:52.107287 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:48910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EFajLEzk2WiQ-10bvQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:53.330702 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:48920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EaTCbgAP5jq5Teg0tgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:53.726216 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:49274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EVajLEzk2WiQ-10bvgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:54.623614 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:48926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ErABkC4fWIHEf8H4nAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:56.899187 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:48940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-FP9ocpUE4ed4uDz47wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:57.601014 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:49278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Ff9ocpUE4ed4uDz48AAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:58.179119 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:38318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-FrABkC4fWIHEf8H4nwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:59.311351 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:38326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-F6TCbgAP5jq5Teg0uAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:00.788511 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:38332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-GJqj1wV0Si-Okef4EwAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:03.852385 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:38334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-G3jZBu2q05ozVU9iogAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:05.161541 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:38348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-HZqj1wV0Si-Okef4FQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:07.581846 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:38360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-H5qj1wV0Si-Okef4GAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:09.935693 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:38782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-IVajLEzk2WiQ-10bwAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:11.224989 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:38784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-I_9ocpUE4ed4uDz49gAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:12.401581 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:38794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-JFajLEzk2WiQ-10bwgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:13.736424 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:38806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-JZqj1wV0Si-Okef4GQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:15.012742 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:38816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-J46lpbStxTqkSkt1mgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:16.322452 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:38826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-KKTCbgAP5jq5Teg0uwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:17.515524 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:38836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-KVajLEzk2WiQ-10bxAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:18.843352 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:51180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Kv9ocpUE4ed4uDz49wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:20.627920 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:51190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-LP9ocpUE4ed4uDz4-AAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:21.848979 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:51192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Lf9ocpUE4ed4uDz4-QAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:22.996703 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:51200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Lv9ocpUE4ed4uDz4-gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:24.064825 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:49282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MLABkC4fWIHEf8H4uQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:24.287410 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:51216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MI6lpbStxTqkSkt1mwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:25.456060 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:41040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MaTCbgAP5jq5Teg0vQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:25.499335 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:51218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MaQpVkWug9HeOt8_UwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:26.662003 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:51230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MrysWC90G-1nBrBNpwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:27.880732 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:51240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-M1ajLEzk2WiQ-10byAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:32.397254 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:60270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-OKQpVkWug9HeOt8_VwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:37.529218 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.243.203:41042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-PVajLEzk2WiQ-10b0gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:40.990895 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:45946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-QKTCbgAP5jq5Teg0zAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:47.295900 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:40614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-RqQpVkWug9HeOt8_XwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:48.580261 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:40620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-SKTCbgAP5jq5Teg01QAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:51.883710 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:40626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-S9SswJuvopo3lOhokgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:55.543163 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:34814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-TtSswJuvopo3lOholQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:31:27.896778 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:60280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-b6TCbgAP5jq5Teg1BQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:38.126261 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:44192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-eqTCbgAP5jq5Teg1DgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:39.466638 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:48708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-e3jZBu2q05ozVU9jDgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:42.430488 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:48710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-fXjZBu2q05ozVU9jFAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:43.740020 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:48718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-f1ajLEzk2WiQ-10b3wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:45.966829 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:48728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-gdSswJuvopo3lOhomwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:47.322383 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-g7ABkC4fWIHEf8H4vwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:48.508269 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:40800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-hHjZBu2q05ozVU9jIAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:49.783015 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:40808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-hXjZBu2q05ozVU9jJAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:51.163070 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-h6TCbgAP5jq5Teg1DwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:52.548313 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:40828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-iKQpVkWug9HeOt8_aAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:54.017493 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ilajLEzk2WiQ-10b4AAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:57.396273 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-jdSswJuvopo3lOhooAAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:58.698433 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:43952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-jrysWC90G-1nBrBNsgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:59.902865 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:43954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-j5qj1wV0Si-Okef4JAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:01.222237 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:43968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-kdSswJuvopo3lOhooQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:02.508122 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:43970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-kqQpVkWug9HeOt8_aQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:05.942777 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:43982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-lZqj1wV0Si-Okef4KAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:07.272064 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:43984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-l6TCbgAP5jq5Teg1EQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:08.593370 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.228.16:48022] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg-mNSswJuvopo3lOhoogAAAIo"]
[Mon Mar 16 14:32:15.259217 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:35494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-n46lpbStxTqkSkt1rQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:16.651638 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:35496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-oHjZBu2q05ozVU9jVAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:19.410643 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:35500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-o6TCbgAP5jq5Teg1FAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:20.737886 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:43120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-pHjZBu2q05ozVU9jXgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:22.083559 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:43132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-prysWC90G-1nBrBNtwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:23.214433 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:43138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-p6TCbgAP5jq5Teg1FQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:24.575383 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:43152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-qLysWC90G-1nBrBNuQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:27.265496 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:43154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-q3jZBu2q05ozVU9jawAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:28.928060 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:33728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-rHjZBu2q05ozVU9jcQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:30.100497 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:33730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-rnjZBu2q05ozVU9jdAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:32.518539 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:33746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-sKTCbgAP5jq5Teg1GAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:33.948357 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:33760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-sbABkC4fWIHEf8H40wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:35.220771 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:33764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-s_9ocpUE4ed4uDz5CwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:36.547581 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:33774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-tLysWC90G-1nBrBNuwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:37.760333 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:33780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-tXjZBu2q05ozVU9jiwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:39.199418 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:47780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-t3jZBu2q05ozVU9jjgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:39.705395 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:34828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-t3jZBu2q05ozVU9jjwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:32:40.543026 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:47782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-uNSswJuvopo3lOhoqAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:41.927427 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:47786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-uaQpVkWug9HeOt8_bQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:43.283869 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:47796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-u7ABkC4fWIHEf8H41wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:44.672989 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:47798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-vI6lpbStxTqkSkt1sgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:46.072651 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:47812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-vrABkC4fWIHEf8H42AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:47.723072 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:47816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-v5qj1wV0Si-Okef4LQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:48.928945 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:38534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-wJqj1wV0Si-Okef4LgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:50.256553 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:38542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-wv9ocpUE4ed4uDz5DwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:51.476173 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:38544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-w_9ocpUE4ed4uDz5EAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:52.788941 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:38558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-xLysWC90G-1nBrBNwAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:54.117303 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-xpqj1wV0Si-Okef4MQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:55.290658 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:38578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-x5qj1wV0Si-Okef4MgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:56.651887 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:38582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-yLysWC90G-1nBrBNwQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:58.041060 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:38584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ylajLEzk2WiQ-10b6wAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:00.248611 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:44614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-y1ajLEzk2WiQ-10b7AAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:01.824628 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:44620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-zbysWC90G-1nBrBNwwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:03.235443 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:44626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-z_9ocpUE4ed4uDz5EgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:04.511011 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:44634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-0FajLEzk2WiQ-10b7gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:05.887505 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:44636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-0bABkC4fWIHEf8H42wAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:07.095137 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:44648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-06TCbgAP5jq5Teg1LwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:08.392045 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:42580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1KQpVkWug9HeOt8_cgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:08.730730 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:48570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1KTCbgAP5jq5Teg1MQAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:09.627401 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:42596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1aQpVkWug9HeOt8_cwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:10.781125 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:42610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1o6lpbStxTqkSkt1uAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:11.030074 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:33318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-11ajLEzk2WiQ-10b8AAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:12.316982 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:42616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2I6lpbStxTqkSkt1uwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:13.607572 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:42630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2f9ocpUE4ed4uDz5EwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:14.791073 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2pqj1wV0Si-Okef4NwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:18.508697 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:42636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-3I6lpbStxTqkSkt1wAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:19.823237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:50544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-35qj1wV0Si-Okef4OAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:21.960290 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:38982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-4Y6lpbStxTqkSkt1wwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:22.075218 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:50556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-4pqj1wV0Si-Okef4PAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:23.362415 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:50566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-41ajLEzk2WiQ-10b8gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:24.569508 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:50580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-5KQpVkWug9HeOt8_dgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:25.862633 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-5dSswJuvopo3lOhorgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:27.084867 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:50588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-59SswJuvopo3lOhorwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:28.334821 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:52646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6NSswJuvopo3lOhosQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:30.655365 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:52650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6pqj1wV0Si-Okef4PgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:31.943349 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:52658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6_9ocpUE4ed4uDz5GAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:34.594146 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:45896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-7qQpVkWug9HeOt8_fwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:39.114334 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:52674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-87ysWC90G-1nBrBNzQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:42.551370 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-9lajLEzk2WiQ-10b-AAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:44.559527 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:60454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg--HjZBu2q05ozVU9jzAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:46.148394 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:49132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg--tSswJuvopo3lOhosgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:48.555453 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:49136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-_LysWC90G-1nBrBNzwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:15.256750 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:49152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_F6TCbgAP5jq5Teg1UAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:21.131236 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:34268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HVajLEzk2WiQ-10cIAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:21.960755 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HVajLEzk2WiQ-10cIQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:34:22.577285 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:48064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HtSswJuvopo3lOhovwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:25.567258 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.244.31:34180] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg_IaTCbgAP5jq5Teg1WQAAAss"]
[Mon Mar 16 14:34:26.150329 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_Ipqj1wV0Si-Okef4SAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:39.944796 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_L_9ocpUE4ed4uDz5LwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:13.857470 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:44750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_UbysWC90G-1nBrBOAQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:35:22.975763 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:51324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_WtSswJuvopo3lOho0gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:45.229950 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:39226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_cZqj1wV0Si-Okef4bQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:35:46.736389 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:36234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_cqQpVkWug9HeOt8_xAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:51.567881 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:51240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_d6QpVkWug9HeOt8_yAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:56.981153 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:51566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_fJqj1wV0Si-Okef4cQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:58.525618 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:51582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_frABkC4fWIHEf8H5DwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:36:02.310531 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:43472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_grABkC4fWIHEf8H5EgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:06.366250 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:42044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_ho6lpbStxTqkSkt14QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:07.961902 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:42060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_h6TCbgAP5jq5Teg1sQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:14.455787 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:51594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_jqQpVkWug9HeOt8_2AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:36:18.411302 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:59790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_knjZBu2q05ozVU9j-gAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:00.459835 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:57036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_vKTCbgAP5jq5Teg1_wAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:01.834075 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:44436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_vVajLEzk2WiQ-10cSQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:03.239874 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:44438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_v6QpVkWug9HeOt8_3wAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:05.475395 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:44452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_wY6lpbStxTqkSkt16QAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:07.365029 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_w46lpbStxTqkSkt16wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:08.779913 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:51814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xLABkC4fWIHEf8H5JQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:08.871303 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.228.16:55460] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg_xLysWC90G-1nBrBOGQAAAZY"]
[Mon Mar 16 14:37:10.034514 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:51824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xrABkC4fWIHEf8H5JgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:10.955201 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:59792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xv9ocpUE4ed4uDz5dgAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:11.426217 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:51830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_x3jZBu2q05ozVU9kBQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:12.452915 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:58558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_yNSswJuvopo3lOho5QAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:12.639887 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:51840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_yNSswJuvopo3lOho5gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:13.888891 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:51844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_ybABkC4fWIHEf8H5JwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:15.123347 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:51852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_y_9ocpUE4ed4uDz5eAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:16.132953 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:58560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zFajLEzk2WiQ-10cTgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:16.600467 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:51864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zJqj1wV0Si-Okef4qQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:17.879143 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:51874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zbABkC4fWIHEf8H5KAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:19.115202 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:51742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_z3jZBu2q05ozVU9kCgAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:21.674929 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_0VajLEzk2WiQ-10cUAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:23.096877 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:51764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_03jZBu2q05ozVU9kDwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:25.688048 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:51766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_1aQpVkWug9HeOt8_5AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:27.314475 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:51772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_1_9ocpUE4ed4uDz5fQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:31.898678 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:37610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_27ABkC4fWIHEf8H5MAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:33.322416 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:37618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_3XjZBu2q05ozVU9kFQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:34.521110 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:37624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_3rysWC90G-1nBrBOIgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:35.856977 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:37628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_37ABkC4fWIHEf8H5MQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:40.570734 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:37644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_5FajLEzk2WiQ-10cWQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:41.915011 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:44074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_5bysWC90G-1nBrBOKAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:45.407087 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:44080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_6bABkC4fWIHEf8H5OAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:45.704301 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:58570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_6aTCbgAP5jq5Teg2IQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:47.983369 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:44086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_66TCbgAP5jq5Teg2JAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:50.465488 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:50926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_7VajLEzk2WiQ-10cXgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:51.807125 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:50938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_7_9ocpUE4ed4uDz5ggAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:54.167434 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:50944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_8v9ocpUE4ed4uDz5hgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:55.512105 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:50956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_8_9ocpUE4ed4uDz5iQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:56.803904 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:50968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_9KTCbgAP5jq5Teg2JwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:02.479692 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:58874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_-qTCbgAP5jq5Teg2MAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:04.916058 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:58876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg__LysWC90G-1nBrBOMQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:07.359787 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:58888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg__6TCbgAP5jq5Teg2MwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:08.701544 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:42724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAAKTCbgAP5jq5Teg2NgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:13.824854 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhABJqj1wV0Si-Okef42QAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:30.030738 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:42746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAFo6lpbStxTqkSkt2BgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:35.031863 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:53230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAG7ysWC90G-1nBrBOOQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:36.903271 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:35818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAHFajLEzk2WiQ-10cigAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:39.631587 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:53242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAH6QpVkWug9HeOt8_-wAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:40.448604 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.243.203:38200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAIFajLEzk2WiQ-10cjgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:43.251761 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:53498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAI46lpbStxTqkSkt2DwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:50.811442 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:57666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAKqQpVkWug9HeOt9ACwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:52.251072 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:44438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhALLysWC90G-1nBrBOQQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:59.443194 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:44450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAM6TCbgAP5jq5Teg2TQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:06.081265 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:33964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAOo6lpbStxTqkSkt2HAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:27.891303 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:52814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhAT3jZBu2q05ozVU9kKAAAAUs"]
[Mon Mar 16 14:39:34.591787 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:53502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAVqQpVkWug9HeOt9APwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:36.974317 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:47608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAWP9ocpUE4ed4uDz5oQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:39:44.335474 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:34428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAX6TCbgAP5jq5Teg2XQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:50.527267 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:34430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAZpqj1wV0Si-Okef5LgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:40:50.447952 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:40160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAov9ocpUE4ed4uDz54wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:05.447877 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:53264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAsXjZBu2q05ozVU9kSAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:41:37.599786 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:58006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA0Zqj1wV0Si-Okef5vQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:38.974386 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:38040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA0tSswJuvopo3lOhpIQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:40.265264 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:38056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA1LysWC90G-1nBrBOdQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:41.828408 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:38066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA1Y6lpbStxTqkSkt2NgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:43.269171 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:38076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA146lpbStxTqkSkt2NwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:44.672685 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:38084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA2I6lpbStxTqkSkt2OgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:45.984650 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:38090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA2XjZBu2q05ozVU9kUAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:47.451977 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA27ABkC4fWIHEf8H5hwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:48.734855 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:56750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA3Jqj1wV0Si-Okef5wAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:50.144006 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:56760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA3lajLEzk2WiQ-10czQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:51.439916 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:56772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA346lpbStxTqkSkt2OwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:55.540694 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:56788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA47ysWC90G-1nBrBOewAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:56.904900 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:56798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA5KQpVkWug9HeOt9AngAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:58.257247 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:41146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA5rABkC4fWIHEf8H5igAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:00.887534 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA6P9ocpUE4ed4uDz6AwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:02.232262 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:41162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA6tSswJuvopo3lOhpLAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:05.507034 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:41174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA7XjZBu2q05ozVU9kVwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:07.974635 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:41178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA71ajLEzk2WiQ-10c0gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:10.524942 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA8VajLEzk2WiQ-10c0wAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:10.531600 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.228.16:33040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhA8Y6lpbStxTqkSkt2TAAAAlA"]
[Mon Mar 16 14:42:12.096166 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:35562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA9KTCbgAP5jq5Teg2vQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:13.365818 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:35568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA9aTCbgAP5jq5Teg2wAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:19.515116 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:35570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA-7ysWC90G-1nBrBOgQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:29.627399 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:60730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBBaQpVkWug9HeOt9AqwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:32.085089 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:52552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBCKQpVkWug9HeOt9ArgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:42.373565 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:52562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBEnjZBu2q05ozVU9kawAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:42:59.416018 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:38178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBI3jZBu2q05ozVU9kfQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:43:21.919199 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:53162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBOZqj1wV0Si-Okef54gAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:43:26.604284 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:49336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBPrysWC90G-1nBrBOkwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:43:29.014049 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:49350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBQaTCbgAP5jq5Teg2_AAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:44:08.771191 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:44294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBaNSswJuvopo3lOhpbAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:44:10.185394 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:40694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBaqTCbgAP5jq5Teg3CAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:21.862673 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:40708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBsaTCbgAP5jq5Teg3UwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:45:34.657616 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:59974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBvrysWC90G-1nBrBOuAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:35.971845 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:34916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBv46lpbStxTqkSkt2ugAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:39.847901 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:34924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBw6QpVkWug9HeOt9A2wAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:41.554882 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:53878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBxaQpVkWug9HeOt9A3QAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:46:53.157120 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:53892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCDbysWC90G-1nBrBO_wAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:47:09.907486 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.228.16:37304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhCHXjZBu2q05ozVU9lPQAAAUo"]
[Mon Mar 16 14:47:23.810407 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:39090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCK_9ocpUE4ed4uDz6ZwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:47:31.352491 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:51646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCM6TCbgAP5jq5Teg3fwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:18.091094 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:42176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCnf9ocpUE4ed4uDz6zAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:49:29.264280 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.244.31:48140] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhCqKTCbgAP5jq5Teg3kQAAAs8"]
[Mon Mar 16 14:49:29.278861 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:58202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCp7ABkC4fWIHEf8H6uAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:31.851104 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:56692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCq7ABkC4fWIHEf8H6vgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:49:40.093803 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:56702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCtLABkC4fWIHEf8H6ywAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:47.961566 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:36138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCu9SswJuvopo3lOhpzQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:07.624062 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:35206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCz6QpVkWug9HeOt9BbAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:09.015297 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:44546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC0f9ocpUE4ed4uDz61gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:10.362888 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:44562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC0tSswJuvopo3lOhp1QAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:12.910911 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:44568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC1HjZBu2q05ozVU9lcgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:15.360976 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:60988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC16TCbgAP5jq5Teg3tgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:50:15.466372 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:44576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC146lpbStxTqkSkt2_gAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:16.774264 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:44588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC2P9ocpUE4ed4uDz62AAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:19.098746 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC2_9ocpUE4ed4uDz63AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:21.631104 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:36406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC3aQpVkWug9HeOt9BdQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:24.894849 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:36412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC4NSswJuvopo3lOhp2gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:26.252325 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:36422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC4qQpVkWug9HeOt9BdwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:30.799534 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:36436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC5o6lpbStxTqkSkt3DAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:34.689087 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:57880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC6rABkC4fWIHEf8H66QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:35.953240 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:57882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC65qj1wV0Si-Okef6SgAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:38.393474 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:57894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC7rysWC90G-1nBrBPqAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:39.763610 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:50280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC73jZBu2q05ozVU9liQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:41.150689 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8bysWC90G-1nBrBPqwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:42.515537 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:57772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8lajLEzk2WiQ-10dRAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:43.058514 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:51420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC86QpVkWug9HeOt9BfQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:43.784364 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8_9ocpUE4ed4uDz64gAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:44.420695 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:51424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9KTCbgAP5jq5Teg3vAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:45.194666 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:57788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9aTCbgAP5jq5Teg3vgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:45.791439 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:51438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9aTCbgAP5jq5Teg3vwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:46.635574 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:57794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9lajLEzk2WiQ-10dRgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:47.263472 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:51454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC95qj1wV0Si-Okef6TQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:47.999380 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:57804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC99SswJuvopo3lOhp4gAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:49.483042 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:57806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-bABkC4fWIHEf8H67gAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:49.691658 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:38160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-Zqj1wV0Si-Okef6UAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:50.911084 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-pqj1wV0Si-Okef6UgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:51.095492 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-5qj1wV0Si-Okef6UwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:52.299367 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:41706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_KQpVkWug9HeOt9BhwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:52.319489 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:38172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_KQpVkWug9HeOt9BiAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:53.653520 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:41720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_aQpVkWug9HeOt9BigAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:53.764273 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:38180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_aQpVkWug9HeOt9BiwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:54.954571 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_rysWC90G-1nBrBPtQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:54.990181 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:38186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_v9ocpUE4ed4uDz65wAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:57.382743 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:38194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAHjZBu2q05ozVU9liwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:57.416354 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:41750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAP9ocpUE4ed4uDz66gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:58.928693 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:41762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAlajLEzk2WiQ-10dSAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:58.957564 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:51178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAv9ocpUE4ed4uDz66wAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:00.297506 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:51180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBJqj1wV0Si-Okef6VQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:01.487465 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:37152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBaTCbgAP5jq5Teg3xAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:02.823387 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBrABkC4fWIHEf8H69AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:02.858993 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:51184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBrABkC4fWIHEf8H69QAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:05.530887 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:51192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDCI6lpbStxTqkSkt3GQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:06.713196 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:37176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDClajLEzk2WiQ-10dTAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:10.357622 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:37190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDDrABkC4fWIHEf8H6-AAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:11.812061 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:53128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDD6TCbgAP5jq5Teg3yAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:13.175501 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:53142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDEZqj1wV0Si-Okef6WgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:15.714791 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:53156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDE6QpVkWug9HeOt9BlgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:17.112922 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:53168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDFdSswJuvopo3lOhp7gAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:19.508728 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:53182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDF1ajLEzk2WiQ-10dUgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:21.889380 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:52322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDGaTCbgAP5jq5Teg3zgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:23.382694 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:52338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDG5qj1wV0Si-Okef6YQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:24.778993 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:52344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDHKTCbgAP5jq5Teg30AAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:26.315590 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:52356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDHrysWC90G-1nBrBPzwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:27.635688 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:52366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDH46lpbStxTqkSkt3IAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:29.075402 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:52372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDIY6lpbStxTqkSkt3IwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:30.107252 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:51204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDIv9ocpUE4ed4uDz7BgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:31.367785 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:33072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDI5qj1wV0Si-Okef6ZgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:31.415406 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:58882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDI7ABkC4fWIHEf8H7BAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:33.923434 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:58896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDJaQpVkWug9HeOt9BmQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:35.343365 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:58908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDJ5qj1wV0Si-Okef6ZwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:36.464871 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:58916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKNSswJuvopo3lOhp9QAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:37.223801 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:33074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKbysWC90G-1nBrBP5gAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:37.858346 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:58926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKY6lpbStxTqkSkt3KAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:38.664722 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:33084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKnjZBu2q05ozVU9llAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:39.242455 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDK6QpVkWug9HeOt9BmgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:40.078636 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:33090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLKTCbgAP5jq5Teg32AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:40.635985 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:35560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLKTCbgAP5jq5Teg32QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:41.851549 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:35576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLVajLEzk2WiQ-10dVAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:42.613406 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:39686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLv9ocpUE4ed4uDz7CQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:44.727856 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:39702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMKQpVkWug9HeOt9BnAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:46.953333 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:35586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMaTCbgAP5jq5Teg32wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:46.954761 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMv9ocpUE4ed4uDz7DAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:49.887427 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:45252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDNZqj1wV0Si-Okef6awAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:51.762028 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:45264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDN7ABkC4fWIHEf8H7CAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:53.186126 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:45268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDOXjZBu2q05ozVU9lmAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:54.108235 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:39724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDOqQpVkWug9HeOt9BoQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:55.469661 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:46752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDO6TCbgAP5jq5Teg33QAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:55.699928 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDO9SswJuvopo3lOhp-wAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:57.069626 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:45286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPZqj1wV0Si-Okef6bQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:57.713229 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:46756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPY6lpbStxTqkSkt3MAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:58.663884 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:50400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPrABkC4fWIHEf8H7DQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:59.149916 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:46772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDP9SswJuvopo3lOhp_AAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:00.720495 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.243.203:60232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQFajLEzk2WiQ-10dXQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:01.571645 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:50412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQVajLEzk2WiQ-10dXgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:02.315644 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:60238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQqQpVkWug9HeOt9BowAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:03.153043 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:50416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQ7ABkC4fWIHEf8H7EQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:06.043512 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:60240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDRlajLEzk2WiQ-10dZgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:08.669583 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:60244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDSI6lpbStxTqkSkt3OgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:10.810779 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:35274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhDSnjZBu2q05ozVU9lnQAAAUQ"]
[Mon Mar 16 14:52:12.712131 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:50420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTKTCbgAP5jq5Teg35gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:14.003474 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:60250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTnjZBu2q05ozVU9logAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:14.251895 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:54162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTtSswJuvopo3lOhqAAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:15.663440 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:54172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDT1ajLEzk2WiQ-10daQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:16.887028 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:47740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUJqj1wV0Si-Okef6dwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:17.163928 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:54180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUZqj1wV0Si-Okef6eAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:18.331658 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:47742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUqQpVkWug9HeOt9BrQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:18.427275 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:53828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUqQpVkWug9HeOt9BrgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:19.721608 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:47744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDU7ABkC4fWIHEf8H7FgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:22.336223 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:53830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDVv9ocpUE4ed4uDz7HAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:22.507913 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:48158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDVtSswJuvopo3lOhqBwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:23.871720 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:53846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDV9SswJuvopo3lOhqCAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:23.956306 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:48174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDV_9ocpUE4ed4uDz7HQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:25.159653 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:53860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDWbABkC4fWIHEf8H7GgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:25.343492 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:48180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDWdSswJuvopo3lOhqCwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:28.125953 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:53872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXLABkC4fWIHEf8H7HgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:28.211580 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:48186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXLABkC4fWIHEf8H7HwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:29.519752 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:58174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXdSswJuvopo3lOhqEAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:29.633487 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXf9ocpUE4ed4uDz7HwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:30.863955 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:58180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXv9ocpUE4ed4uDz7IQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:32.209013 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYP9ocpUE4ed4uDz7JQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:33.386376 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:58192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYbABkC4fWIHEf8H7IAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:34.443375 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:42544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYv9ocpUE4ed4uDz7KQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:34.759346 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:58198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYrABkC4fWIHEf8H7IQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:35.823040 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:42550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDY1ajLEzk2WiQ-10dbQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:44.512586 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:42564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDbI6lpbStxTqkSkt3TAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:48.104379 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDcLABkC4fWIHEf8H7LAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:49.535087 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDcVajLEzk2WiQ-10dcQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:50.763682 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:33292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDctSswJuvopo3lOhqFwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:53.279801 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:33302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDddSswJuvopo3lOhqGgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:54.633916 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:33314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDdlajLEzk2WiQ-10dcgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:55.020047 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:58214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDd6TCbgAP5jq5Teg3_AAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:52:55.905742 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:33328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDd5qj1wV0Si-Okef6ggAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:57.272033 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:33332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDedSswJuvopo3lOhqGwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:04.249497 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:33336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgP9ocpUE4ed4uDz7MwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:05.607406 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:48422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgXjZBu2q05ozVU9lrwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:06.949753 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:48434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgv9ocpUE4ed4uDz7OQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:08.299989 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:48444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDhKTCbgAP5jq5Teg4CwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:09.674816 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:48460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDhVajLEzk2WiQ-10deAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:11.011543 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:46476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDh3jZBu2q05ozVU9lsAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:14.919742 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:46488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDitSswJuvopo3lOhqIwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:16.294995 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:46494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjNSswJuvopo3lOhqJQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:17.701700 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:46502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjaQpVkWug9HeOt9BzwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:18.923661 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:46512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjqTCbgAP5jq5Teg4DQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:20.136408 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:47462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkNSswJuvopo3lOhqKAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:21.463547 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:47466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkXjZBu2q05ozVU9luAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:22.915053 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:47482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkqQpVkWug9HeOt9B1AAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:25.255593 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDlXjZBu2q05ozVU9luwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:30.860119 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDmaTCbgAP5jq5Teg4FwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:34.735427 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:45704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDnpqj1wV0Si-Okef6pgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:35.772846 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:42014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDn7ysWC90G-1nBrBQIAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:40.715631 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:42024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDpLABkC4fWIHEf8H7TgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:48.091865 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:43082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDqrysWC90G-1nBrBQJwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:49.318785 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:38522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDrdSswJuvopo3lOhqOgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:50.971319 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:55696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDrnjZBu2q05ozVU9lxAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:52.251190 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:55698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDsKQpVkWug9HeOt9B2gAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:55.385131 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:43084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDso6lpbStxTqkSkt3hwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:58.268191 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:49160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDtnjZBu2q05ozVU9lxwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:54:01.271023 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:49176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDt6TCbgAP5jq5Teg4HwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:54:10.179379 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:48164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDwlajLEzk2WiQ-10djgAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:54:10.279175 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:55704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDwrysWC90G-1nBrBQNwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:54:15.583242 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:36356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDx3jZBu2q05ozVU9lzwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:55:22.590880 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.244.31:59138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhECqQpVkWug9HeOt9B7QAAA1E"]
[Mon Mar 16 14:57:19.251535 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:33130] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhEf3jZBu2q05ozVU9l-QAAAVM"]
[Mon Mar 16 15:01:11.811161 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.244.31:55322] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhFZ6TCbgAP5jq5Teg43QAAAsQ"]
[Mon Mar 16 15:02:40.802709 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.228.16:58540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhFwI6lpbStxTqkSkt4FgAAAk8"]
[Mon Mar 16 15:06:33.471119 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.244.31:59296] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhGqVajLEzk2WiQ-10eNgAAApM"]
[Mon Mar 16 15:07:58.651303 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:60282] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhG_njZBu2q05ozVU9mhwAAAU0"]
[Mon Mar 16 15:11:34.185352 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:45372] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhH1njZBu2q05ozVU9mswAAAUs"]
[Mon Mar 16 15:16:57.776390 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.244.31:60134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhJGLABkC4fWIHEf8H8lwAAAEQ"]
[Mon Mar 16 15:23:29.640187 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.228.16:36904] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhKoUr9dMAiw-8KANNSsQAAAQ8"]
[Mon Mar 16 15:27:25.378407 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.244.31:37938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhLjUr9dMAiw-8KANNS3QAAARI"]
[Mon Mar 16 15:27:30.606337 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.228.16:52172] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhLklajLEzk2WiQ-10fugAAAos"]
[Mon Mar 16 15:32:26.768956 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.244.31:39518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhMulajLEzk2WiQ-10f9AAAAoc"]
[Mon Mar 16 15:34:04.181888 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.228.16:50000] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhNHKQpVkWug9HeOt9DwwAAA1g"]
[Mon Mar 16 15:37:48.083037 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.244.31:50930] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhN_KTCbgAP5jq5Teg6fwAAAsw"]
[Mon Mar 16 15:39:25.764700 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.228.16:36384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhOXf9ocpUE4ed4uDz-GgAAAg8"]
[Mon Mar 16 15:43:01.656896 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.244.31:44474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhPNaTCbgAP5jq5Teg7BgAAAsU"]
[Mon Mar 16 15:44:00.158872 2026] [access_compat:error] [pid 15568:tid 140411574073088] [client 141.98.11.23:59724] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Mon Mar 16 15:44:08.111255 2026] [access_compat:error] [pid 29802:tid 140411548894976] [client 141.98.11.23:60875] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Mon Mar 16 15:44:34.318096 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.228.16:59348] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhPklajLEzk2WiQ-10gkAAAApY"]
[Mon Mar 16 15:49:39.846800 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:37076] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhQw9SswJuvopo3lOhtnAAAAII"]
[Mon Mar 16 15:50:40.292285 2026] [access_compat:error] [pid 15061:tid 140411691570944] [client 200.107.116.178:32389] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 15:52:17.365020 2026] [access_compat:error] [pid 14895:tid 140411674785536] [client 186.247.17.110:60835] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 15:52:56.220430 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.228.16:41462] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhRiNSswJuvopo3lOht9wAAAJc"]
[Mon Mar 16 15:53:39.842716 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.244.31:51048] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhRs8_BxrYCr4hPDw_6HQAAAc4"]
[Mon Mar 16 15:58:59.995931 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.244.31:55994] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhS88_BxrYCr4hPDw_6cgAAAdA"]
[Mon Mar 16 16:00:40.319602 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.228.16:56456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhTWKTCbgAP5jq5Teg8mwAAAtE"]
[Mon Mar 16 16:04:09.557604 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.244.31:33932] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhUKc_BxrYCr4hPDw_7DAAAAcU"]
[Mon Mar 16 16:05:51.925655 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.228.16:47800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhUj1ajLEzk2WiQ-10i5wAAApc"]
[Mon Mar 16 16:09:21.308937 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.244.31:49816] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhVYaQpVkWug9HeOt9GtAAAA0Q"]
[Mon Mar 16 16:11:15.052097 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:47222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhV01ajLEzk2WiQ-10jJgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:11:16.648186 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.228.16:34932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhV1Er9dMAiw-8KANNW3QAAAQY"]
[Mon Mar 16 16:11:36.231077 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:46312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhV6KTCbgAP5jq5Teg9GwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:12:14.571220 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:52868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhWDv9ocpUE4ed4uDwCdAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:13:11.091987 2026] [access_compat:error] [pid 15568:tid 140411716749056] [client 45.94.31.197:33836] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 16:14:37.310943 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.244.31:50958] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhWnaQpVkWug9HeOt9G6gAAA1g"]
[Mon Mar 16 16:16:59.994431 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:50352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXK1ajLEzk2WiQ-10jVwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:05.873785 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:50354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXMVajLEzk2WiQ-10jWQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:11.931853 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXN1ajLEzk2WiQ-10jWwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:18.428048 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:45664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXPo6lpbStxTqkSkt8UgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:24.502650 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:45678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXRKTCbgAP5jq5Teg9WQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:30.617645 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:37204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXSlajLEzk2WiQ-10jZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:36.548559 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:37216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXUP9ocpUE4ed4uDwDNQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:42.710189 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:49886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXVs_BxrYCr4hPDw_7kQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:48.826317 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:42508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXXLysWC90G-1nBrBUuwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:55.210780 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:42522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXY6TCbgAP5jq5Teg9YAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:01.124533 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:52380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXadSswJuvopo3lOhv2wAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:07.490994 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:52392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXb7ABkC4fWIHEf8ECUAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:13.707117 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:44110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXdbysWC90G-1nBrBUvwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:19.736434 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:51902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXe7ABkC4fWIHEf8ECUwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:25.650965 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:51906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXgaQpVkWug9HeOt9HYQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:33.339009 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:56420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXiLABkC4fWIHEf8ECWAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:38.024728 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:56424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXjv9ocpUE4ed4uDwDRgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:44.410275 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:59742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXlNSswJuvopo3lOhv5QAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:50.903889 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:44366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXmv9ocpUE4ed4uDwDSgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:08.892109 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:45968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXrP9ocpUE4ed4uDwDTgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:21.074754 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:38136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXubysWC90G-1nBrBU8gAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:24.580640 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:43984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXvLysWC90G-1nBrBU-AAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:27.810596 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:43998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXvf9ocpUE4ed4uDwDVQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:35.836510 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:44004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXx_9ocpUE4ed4uDwDZAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:19:39.322463 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:58534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXy_9ocpUE4ed4uDwDZwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:39.662053 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:38086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhXy7ABkC4fWIHEf8ECagAAAFg"]
[Mon Mar 16 16:19:42.744654 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:43112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXzrysWC90G-1nBrBU-wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:59.729125 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:43122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhX36QpVkWug9HeOt9HhgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:03.826139 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:41140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhX49SswJuvopo3lOhv9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:33.246621 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYAaTCbgAP5jq5Teg9jQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:39.949694 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:45090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYB46lpbStxTqkSkt8fAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:44.428737 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:60534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYDLysWC90G-1nBrBVBQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:45.739444 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:60546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYDc_BxrYCr4hPDw_8DAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:49.261027 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:60562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYEY6lpbStxTqkSkt8fgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:08.340183 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:33076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYJLABkC4fWIHEf8ECxgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:09.646133 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:35590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYJVajLEzk2WiQ-10jjwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:14.015894 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:45974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYKs_BxrYCr4hPDw_8JAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:15.331704 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:34526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYK7ysWC90G-1nBrBVCAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:21:44.795549 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:34538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYSP9ocpUE4ed4uDwDkgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:22:00.024580 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:54218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYWEr9dMAiw-8KANNXlwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:10.182149 2026] [mime_magic:error] [pid 15568:tid 140411624429312] (70014)End of file found: [client 74.7.243.203:50216] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/include/bits
[Mon Mar 16 16:23:14.879571 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:51522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYoqTCbgAP5jq5Teg9rgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:16.465560 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:51528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYpNSswJuvopo3lOhwbQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:40.891844 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:59254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYvFajLEzk2WiQ-10kDgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:46.446968 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:51530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYwrysWC90G-1nBrBVgQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:47.808546 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYw6QpVkWug9HeOt9HoAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:50.286275 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:52266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYxaTCbgAP5jq5Teg9swAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:56.089117 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:55764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzKTCbgAP5jq5Teg9uwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:57.403480 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:55768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzbysWC90G-1nBrBVjQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:58.689180 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:55784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzrysWC90G-1nBrBVkAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:21.155156 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:55792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY5Y6lpbStxTqkSkt8qQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:22.409403 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:35928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY5rABkC4fWIHEf8EDQAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:23.739150 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:35932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY58_BxrYCr4hPDw_8PwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:24.944048 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:35944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY6KQpVkWug9HeOt9HpQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:26.259341 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:35946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY6tSswJuvopo3lOhwgAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:27.415770 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:35962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY60r9dMAiw-8KANNXqAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:28.623096 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:35972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY7NSswJuvopo3lOhwgQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:29.950990 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY7bABkC4fWIHEf8EDUgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:31.271341 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:44028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY76TCbgAP5jq5Teg9xQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:32.503047 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:44038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8KTCbgAP5jq5Teg9xgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:33.723543 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:44042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8bABkC4fWIHEf8EDWQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:34.987292 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:44058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8qTCbgAP5jq5Teg9xwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:36.150494 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:44068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9KQpVkWug9HeOt9HqAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:37.338188 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:44076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9aTCbgAP5jq5Teg9yQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:39.641887 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:44084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9qQpVkWug9HeOt9HqQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:43.459432 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:51122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY-7ABkC4fWIHEf8EDbwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:47.021467 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY_8_BxrYCr4hPDw_8RgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:02.620844 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:51134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZDlajLEzk2WiQ-10kJAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:04.984853 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:57520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZEM_BxrYCr4hPDw_8SgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:41.530813 2026] [access_compat:error] [pid 29802:tid 140411658000128] [client 142.248.80.157:56127] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Mon Mar 16 16:25:44.018142 2026] [access_compat:error] [pid 29802:tid 140411691570944] [client 142.248.80.157:56127] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Mon Mar 16 16:25:55.097663 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:53740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZQ0r9dMAiw-8KANNX7QAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:25:57.568517 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:36658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZRf9ocpUE4ed4uDwDxQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:20.853503 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:56864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhZXLABkC4fWIHEf8EELgAAAEs"]
[Mon Mar 16 16:26:45.183699 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:33962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZdbABkC4fWIHEf8EEWAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:48.684020 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:47016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZeLABkC4fWIHEf8EEXQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:49.951609 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:55138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZedSswJuvopo3lOhwjgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:52.154831 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:55148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZfI6lpbStxTqkSkt8wAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:57.164424 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:55158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZgaQpVkWug9HeOt9HxQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:10.302455 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:53978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZjY6lpbStxTqkSkt8zQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:11.706235 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:44130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZj7ABkC4fWIHEf8EEeQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:12.871650 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:44142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZkLABkC4fWIHEf8EEfAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:19.260912 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:44146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZl_9ocpUE4ed4uDwD1QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:20.612714 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZmP9ocpUE4ed4uDwD1gAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:21.897010 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZmaQpVkWug9HeOt9HygAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:23.242343 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:41442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZm9SswJuvopo3lOhwjwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:24.487804 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:41446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZnLysWC90G-1nBrBVqwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:25.672868 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:41458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZnUr9dMAiw-8KANNYPwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:29.055913 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:41464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZoY6lpbStxTqkSkt81AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:30.397551 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:36224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZoqQpVkWug9HeOt9HywAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:33.034981 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:36238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZpUr9dMAiw-8KANNYQQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:34.535286 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:36254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZpv9ocpUE4ed4uDwD1wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:35.865013 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:36256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZp1ajLEzk2WiQ-10kUAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:38.279426 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:36268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZqdSswJuvopo3lOhwkgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:39.774979 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:54036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZq8_BxrYCr4hPDw_8cgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:41.215329 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:54048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZrf9ocpUE4ed4uDwD2gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:45.132606 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:54062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZsaTCbgAP5jq5Teg92QAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:47.867167 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:54066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZs6QpVkWug9HeOt9H0AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:53.094615 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:37000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZubysWC90G-1nBrBVswAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:54.480029 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:37002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZuqTCbgAP5jq5Teg92gAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:28:36.242324 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:37010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5Er9dMAiw-8KANNYawAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:37.606076 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:53410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5bABkC4fWIHEf8EFEAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:38.863779 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:33522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5rABkC4fWIHEf8EFFQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:40.219069 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:33530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ6LABkC4fWIHEf8EFGQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:41.401865 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:33542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ6Ur9dMAiw-8KANNYbAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:44.839385 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:33548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ7KQpVkWug9HeOt9H2gAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:46.126968 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:33564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ7rysWC90G-1nBrBVugAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:47.444072 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:33576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ78_BxrYCr4hPDw_8fgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:48.615322 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:60394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ8KQpVkWug9HeOt9H2wAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:49.986686 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:60404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ8Ur9dMAiw-8KANNYbQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:51.181011 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:60408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ86TCbgAP5jq5Teg94AAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:53.523602 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:60414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ9f9ocpUE4ed4uDwD6QAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:54.821382 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:60430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ9s_BxrYCr4hPDw_8fwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:55.954955 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:60434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ90r9dMAiw-8KANNYbgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:59.370807 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:60440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ-46lpbStxTqkSkt84QAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:00.696905 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:47212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ_LysWC90G-1nBrBVvwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:02.970434 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:47222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ_lajLEzk2WiQ-10kXgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:05.367980 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:47232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaAUr9dMAiw-8KANNYcQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:07.687131 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:47242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaAv9ocpUE4ed4uDwD7gAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:09.090326 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaBaTCbgAP5jq5Teg94gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:10.303715 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:57380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaBo6lpbStxTqkSkt84gAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:18.378601 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:57390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaDkr9dMAiw-8KANNYfAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:19.810465 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:60014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaD_9ocpUE4ed4uDwEAgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:21.019155 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:60018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaEc_BxrYCr4hPDw_8gwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:22.365538 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:60030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaEv9ocpUE4ed4uDwEBgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:23.548335 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:60044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaE6TCbgAP5jq5Teg94wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:26.968055 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:60058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaFv9ocpUE4ed4uDwEDgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:29.367459 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:45748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaGf9ocpUE4ed4uDwEEwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:35.130423 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:45756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaHf9ocpUE4ed4uDwEGwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:40.172135 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:45772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJKTCbgAP5jq5Teg95wAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:41.512422 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:51492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJbysWC90G-1nBrBVwwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:41.735845 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.244.31:56642] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhaJY6lpbStxTqkSkt85QAAAkE"]
[Mon Mar 16 16:29:43.505158 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:51502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJtSswJuvopo3lOhwyAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:45.964347 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:51510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaKdSswJuvopo3lOhwzQAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:47.903372 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:51520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaK1ajLEzk2WiQ-10kZAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:54.685776 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:60638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaMlajLEzk2WiQ-10kagAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:03.546089 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:60646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaO7ysWC90G-1nBrBVyQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:05.133100 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:50094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaPf9ocpUE4ed4uDwENwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:10.471482 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:58674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaQrysWC90G-1nBrBVzwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:23.369450 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:50440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaT1ajLEzk2WiQ-10kdwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:31:20.858742 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:50372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaiM_BxrYCr4hPDw_80gAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:21.035104 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.228.16:52960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhaiUr9dMAiw-8KANNYiwAAAQs"]
[Mon Mar 16 16:31:23.349838 2026] [mime_magic:error] [pid 14895:tid 140411683178240] (70014)End of file found: [client 74.7.243.203:38744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Mon Mar 16 16:31:24.241830 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.243.203:38748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhajM_BxrYCr4hPDw_80wAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:27.001604 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:38762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaj8_BxrYCr4hPDw_81wAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:29.864209 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:38772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhakaTCbgAP5jq5Teg-DgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:31.597776 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:37906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhak9SswJuvopo3lOhxEQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:32.729384 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:37914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhalKTCbgAP5jq5Teg-EgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:35.264800 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:37916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhal7ABkC4fWIHEf8EFYgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:37.849337 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:37930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhamaQpVkWug9HeOt9H_QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:39.259276 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:37942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abham6QpVkWug9HeOt9H_gAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:40.623950 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:57948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhanP9ocpUE4ed4uDwEUgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:45.047697 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:57958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaobysWC90G-1nBrBV4QAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:47.431110 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhao6QpVkWug9HeOt9IBAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:50.184522 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:57986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhapdSswJuvopo3lOhxFgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:52.648501 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:34824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaqLysWC90G-1nBrBV4wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:55.015099 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:34838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaq0r9dMAiw-8KANNYlQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:56.371825 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:34840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abharEr9dMAiw-8KANNYlwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:00.903295 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:34852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhasM_BxrYCr4hPDw_84wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:02.262602 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:47710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhasv9ocpUE4ed4uDwEWgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:03.471255 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:47712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhas9SswJuvopo3lOhxGQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:04.791406 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:47720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhatNSswJuvopo3lOhxGgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:09.522889 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:47728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhauP9ocpUE4ed4uDwEXgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:11.964340 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:45694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhau7ABkC4fWIHEf8EFbgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:14.260118 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:49806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhavlajLEzk2WiQ-10k6AAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:16.589240 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:45700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhawLysWC90G-1nBrBV6gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:17.919821 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:51196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhawY6lpbStxTqkSkt9CQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:19.022281 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.243.203:45702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaw0r9dMAiw-8KANNYmgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:29.455712 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhazdSswJuvopo3lOhxJQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:31.802404 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaz9SswJuvopo3lOhxJwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:32.403456 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha0KQpVkWug9HeOt9IFQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:36.246552 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:53374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha1KTCbgAP5jq5Teg-UAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:38.619789 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:53382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha1kr9dMAiw-8KANNYogAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:39.936223 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:53388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha17ysWC90G-1nBrBV7gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:41.440502 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:35210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha2Ur9dMAiw-8KANNYpAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:42.700787 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:35226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha2kr9dMAiw-8KANNYpgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:43.927575 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:35236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha29SswJuvopo3lOhxKQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:45.110000 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:35248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3dSswJuvopo3lOhxKwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:46.451089 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.243.203:35258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3lajLEzk2WiQ-10k6wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:47.747784 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:39480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3_9ocpUE4ed4uDwEcwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:51.943238 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:35262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha48_BxrYCr4hPDw_88QAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:53.370845 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:36670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5f9ocpUE4ed4uDwEdQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:54.403464 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:36020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5lajLEzk2WiQ-10k8gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:54.580953 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:36684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5kr9dMAiw-8KANNYqwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:55.919967 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:36692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha59SswJuvopo3lOhxLwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:56.796856 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha6FajLEzk2WiQ-10k9AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:58.222297 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:36700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha6v9ocpUE4ed4uDwEeQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:59.540366 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:36710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha67ABkC4fWIHEf8EFewAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:00.687405 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:55260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha7M_BxrYCr4hPDw_89AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:02.366750 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:55274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha7Ur9dMAiw-8KANNYrgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:03.851998 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:55282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha71ajLEzk2WiQ-10k9wAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:05.219044 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:55286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha8Y6lpbStxTqkSkt9GAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:07.828806 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:55290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha8qQpVkWug9HeOt9IHAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:09.193506 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:55306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha9Ur9dMAiw-8KANNYsQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:11.603011 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:54208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha98_BxrYCr4hPDw_8-gAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:12.918133 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:54210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha-LABkC4fWIHEf8EFgAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:15.585855 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:54214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha-rysWC90G-1nBrBV_AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:16.890946 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:54216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_M_BxrYCr4hPDw_8_QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:18.134247 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:54232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_qTCbgAP5jq5Teg-egAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:19.525415 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:54248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_6TCbgAP5jq5Teg-fwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:20.720412 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:50340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbAP9ocpUE4ed4uDwEiAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:22.029122 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:50344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbAo6lpbStxTqkSkt9HgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:26.166282 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:50350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbBqQpVkWug9HeOt9IKQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:27.263668 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:56174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbB9SswJuvopo3lOhxTQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:27.463520 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:50366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbB6TCbgAP5jq5Teg-hAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:28.934161 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:50372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbCI6lpbStxTqkSkt9IQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:40.434615 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbFLysWC90G-1nBrBWEgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:42.875683 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:56462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbFtSswJuvopo3lOhxVQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:47.471534 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbG8_BxrYCr4hPDw_9FwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:52.999170 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:51764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbIKQpVkWug9HeOt9IOAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:08.483530 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:51774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbMEr9dMAiw-8KANNY0wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:09.845089 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:60212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbMf9ocpUE4ed4uDwEmwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:13.106183 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:60228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbNf9ocpUE4ed4uDwEnwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:14.402727 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:60244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbNqTCbgAP5jq5Teg-lAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:15.529924 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:60248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbN_9ocpUE4ed4uDwEowAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:16.856975 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:60254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbONSswJuvopo3lOhxewAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:20.003126 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:60260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPM_BxrYCr4hPDw_9JQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:20.201245 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:56476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPNSswJuvopo3lOhxfwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:34:22.391653 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:37918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPv9ocpUE4ed4uDwEpwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:22.623838 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPo6lpbStxTqkSkt9NAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:24.799190 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:37924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbQLABkC4fWIHEf8EFowAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:26.089079 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:37934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbQv9ocpUE4ed4uDwEqwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:28.803008 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:37942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbRKTCbgAP5jq5Teg-mQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:30.164425 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:42668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbRv9ocpUE4ed4uDwErAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:31.306030 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:42682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbR7ABkC4fWIHEf8EFqAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:32.591652 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbSI6lpbStxTqkSkt9NwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:35.144020 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:42708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbSUr9dMAiw-8KANNY4wAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:36.442521 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:42722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTLABkC4fWIHEf8EFqgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:37.628223 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTc_BxrYCr4hPDw_9JwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:38.903515 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:37320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTqTCbgAP5jq5Teg-mwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:40.076208 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:37328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbUM_BxrYCr4hPDw_9KAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:41.348140 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:37338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbUaQpVkWug9HeOt9IRAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:42.025809 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.244.31:49318] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhbUrysWC90G-1nBrBWKAAAAYE"]
[Mon Mar 16 16:34:43.588943 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:37352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbU7ABkC4fWIHEf8EFrgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:44.925436 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:37356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbVKQpVkWug9HeOt9IRgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:48.230829 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:37360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWM_BxrYCr4hPDw_9LAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:49.528352 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:38532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWdSswJuvopo3lOhxigAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:50.730401 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:38536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWo6lpbStxTqkSkt9PQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:52.015918 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:38546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXP9ocpUE4ed4uDwEtAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:53.211102 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:38558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXdSswJuvopo3lOhxjAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:54.548197 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:38564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXrABkC4fWIHEf8EFtQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:55.716691 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:38566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbX_9ocpUE4ed4uDwEtgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:58.092450 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:38576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbYf9ocpUE4ed4uDwEuAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:59.478606 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:55718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbY8_BxrYCr4hPDw_9MQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:04.396528 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:55734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbaLysWC90G-1nBrBWMQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:06.470859 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:55748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbaY6lpbStxTqkSkt9QAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:07.825535 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhba7ysWC90G-1nBrBWMgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:08.971188 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:34786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbbI6lpbStxTqkSkt9QgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:10.299451 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:34794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbbqTCbgAP5jq5Teg-pwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:11.511582 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbb7ABkC4fWIHEf8EFwwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:12.828909 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:36328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbcEr9dMAiw-8KANNZCgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:13.767660 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:34802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbcc_BxrYCr4hPDw_9NQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:14.215684 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbctSswJuvopo3lOhxkwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:15.435074 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:39792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbc9SswJuvopo3lOhxlQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:16.153037 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:34808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbdFajLEzk2WiQ-10laAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:18.214216 2026] [access_compat:error] [pid 15061:tid 140411599251200] [client 142.248.80.157:62967] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Mon Mar 16 16:35:19.682909 2026] [access_compat:error] [pid 15061:tid 140411658000128] [client 142.248.80.157:62967] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Mon Mar 16 16:35:19.775185 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:34816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbd_9ocpUE4ed4uDwEwQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:25.671831 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbfbABkC4fWIHEf8EF0gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:28.107633 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:45586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbgKTCbgAP5jq5Teg-twAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:33.819485 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:45602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbhc_BxrYCr4hPDw_9PwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:35:35.642883 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:42828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbh_9ocpUE4ed4uDwExAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:58.925037 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:42840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbno6lpbStxTqkSkt9XQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:58.929811 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:53074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbnlajLEzk2WiQ-10loAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:00.334640 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:47682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhboLysWC90G-1nBrBWRQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:01.620647 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:47696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhboaQpVkWug9HeOt9IVAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:03.520208 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:54330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbo7ysWC90G-1nBrBWSwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:05.080625 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:47712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbpaQpVkWug9HeOt9IXAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:07.218578 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:54342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbp6QpVkWug9HeOt9IXwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:36:07.505310 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:47724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbp6TCbgAP5jq5Teg-0gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:12.361609 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbrKQpVkWug9HeOt9IbQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:13.675123 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:56724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbraQpVkWug9HeOt9IcAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:14.925154 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.243.203:56736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbrs_BxrYCr4hPDw_9RgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:16.081785 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:56750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbsLysWC90G-1nBrBWTQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:17.258448 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:56766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbsUr9dMAiw-8KANNZFgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:18.546968 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:56778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbss_BxrYCr4hPDw_9RwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:21.913512 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:58932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbtaQpVkWug9HeOt9IdwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:21.968130 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:56790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbtdSswJuvopo3lOhxqQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:23.152211 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.228.16:58604] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhbt_9ocpUE4ed4uDwE3AAAAhU"]
[Mon Mar 16 16:36:23.236249 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:58542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbt8_BxrYCr4hPDw_9SQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:26.611791 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbuv9ocpUE4ed4uDwE4gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:28.025104 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:58562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvKTCbgAP5jq5Teg-6gAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:29.350987 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:58576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvf9ocpUE4ed4uDwE5QAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:30.527573 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:42722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvqQpVkWug9HeOt9IfgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:31.844390 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:42734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbv6QpVkWug9HeOt9IfwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:35.217384 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:42740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbw6TCbgAP5jq5Teg-_QAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:38.678698 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:42756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbxlajLEzk2WiQ-10lrQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:40.003615 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:42770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbyFajLEzk2WiQ-10lrwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:41.231551 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:36618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbyf9ocpUE4ed4uDwE7AAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:42.446076 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:36634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbylajLEzk2WiQ-10lsAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:43.620736 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:36640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhby_9ocpUE4ed4uDwE7gAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:46.035591 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:36652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbzrysWC90G-1nBrBWVgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:47.379060 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:36664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbz6QpVkWug9HeOt9IgQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:48.791129 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb0LysWC90G-1nBrBWWAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:52.563108 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:36686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb1KTCbgAP5jq5Teg_HQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:53.881368 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:33102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb1aQpVkWug9HeOt9IgwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:55.079967 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb146lpbStxTqkSkt9YQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:57.429461 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb2f9ocpUE4ed4uDwE9wAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:04.412659 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:33142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb4KQpVkWug9HeOt9IjAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:05.728039 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:40142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb4Y6lpbStxTqkSkt9ZwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:08.279484 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:40146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb5P9ocpUE4ed4uDwFAwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:13.871490 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb6f9ocpUE4ed4uDwFCgAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:18.508255 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:58776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb7s_BxrYCr4hPDw_9UwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:33.873462 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:49744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb_aTCbgAP5jq5Teg_YgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 16:37:37.354500 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:49668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcAY6lpbStxTqkSkt9dAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:38:05.817696 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:58790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcHf9ocpUE4ed4uDwFVwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:11.853850 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:55424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcI46lpbStxTqkSkt9fQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:13.173157 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:40356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcJaTCbgAP5jq5Teg_dwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:16.574329 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:40358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcKKQpVkWug9HeOt9IlwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:38:19.283472 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:51926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcK1ajLEzk2WiQ-10mDAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:22.739869 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:52406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcLs_BxrYCr4hPDw_9bwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:39.347273 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:40374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcP6TCbgAP5jq5Teg_mgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:41.520306 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:49394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcQNSswJuvopo3lOhx4QAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:38:53.453038 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:52416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcTY6lpbStxTqkSkt9qQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:00.163869 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:38828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVP9ocpUE4ed4uDwFdAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:00.230544 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:49404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVI6lpbStxTqkSkt9rwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:01.478726 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:53480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVdSswJuvopo3lOhx5QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:02.640112 2026] [access_compat:error] [pid 29507:tid 140411616036608] [client 136.117.173.182:55024] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 16:39:03.835544 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:51064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcV6QpVkWug9HeOt9InQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:08.304425 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:51068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcXNSswJuvopo3lOhx7wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:16.294129 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:53486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcZM_BxrYCr4hPDw_9hAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:18.992070 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:33810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcZqTCbgAP5jq5Teg_nwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:28.670598 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:51084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhccEr9dMAiw-8KANNZVwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:31.163385 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:39706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcc_9ocpUE4ed4uDwFegAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:32.434460 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:38984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcdFajLEzk2WiQ-10mNAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:34.744434 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:38994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcdo6lpbStxTqkSkt9tAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:36.066763 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:38996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhceLABkC4fWIHEf8EGJgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:43.338462 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.244.31:40138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhcf46lpbStxTqkSkt9tgAAAkc"]
[Mon Mar 16 16:39:45.096811 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:39004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcgc_BxrYCr4hPDw_9jwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:47.419135 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:41518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcg_9ocpUE4ed4uDwFhgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:48.709943 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:41530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhchKQpVkWug9HeOt9IrgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:53.523916 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:41536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcibABkC4fWIHEf8EGKgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:58.602775 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:59286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcjVajLEzk2WiQ-10mQwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:59.921857 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:59300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcj6QpVkWug9HeOt9IswAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:40:06.451175 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:46434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhclqTCbgAP5jq5Teg_2QAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:40:06.522207 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:57486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhclo6lpbStxTqkSkt9wgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:40:13.325458 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:57488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcnbABkC4fWIHEf8EGNQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:23.201700 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.228.16:41354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhc46TCbgAP5jq5Teg_8gAAAss"]
[Mon Mar 16 16:41:27.145875 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:34292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhc57ysWC90G-1nBrBXHQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:30.612044 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:37500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhc6rABkC4fWIHEf8EGVAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:41:54.072198 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:40166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdAkr9dMAiw-8KANNZvQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:54.359317 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:37508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdAs_BxrYCr4hPDw_9xQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:56.789567 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:36740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdBEr9dMAiw-8KANNZwAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:58.111255 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:44008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdBlajLEzk2WiQ-10mZQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:04.646840 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:54238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdDLysWC90G-1nBrBXLAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:06.997536 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:48442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdDqQpVkWug9HeOt9I0QAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:09.179060 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:44020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdEVajLEzk2WiQ-10mcwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:10.503957 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:57006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdElajLEzk2WiQ-10mdgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:42:11.715044 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:57016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdE0r9dMAiw-8KANNZwwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:12.754710 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:48444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdFFajLEzk2WiQ-10megAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:14.138168 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:57024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdFqTCbgAP5jq5Teg__AAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:17.218200 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:38864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdGf9ocpUE4ed4uDwFtgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:20.585449 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:38866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdHI6lpbStxTqkSkt95gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:21.913690 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:55360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdHdSswJuvopo3lOhycwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:23.280179 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:55370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdH1ajLEzk2WiQ-10mewAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:24.597110 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdIP9ocpUE4ed4uDwFvgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:25.891742 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:55384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdIdSswJuvopo3lOhyewAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:28.481945 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:55390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJNSswJuvopo3lOhygAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:29.732362 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:55392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJf9ocpUE4ed4uDwFwwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:30.886354 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:55562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJlajLEzk2WiQ-10mfAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:32.173770 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:55568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKLABkC4fWIHEf8EGZQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:33.527410 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:55574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKf9ocpUE4ed4uDwFxwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:34.969324 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:55590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKlajLEzk2WiQ-10mggAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:36.174340 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:55592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLP9ocpUE4ed4uDwFzAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:37.380986 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:55600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLVajLEzk2WiQ-10mhAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:38.801172 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:55602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLo6lpbStxTqkSkt96AAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:40.006483 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:55614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMLABkC4fWIHEf8EGagAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:41.205328 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMY6lpbStxTqkSkt96QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:42.511904 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:35450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMo6lpbStxTqkSkt96gAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:43.718712 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:35466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdM6QpVkWug9HeOt9I1wAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:45.049647 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:35482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdNbABkC4fWIHEf8EGbAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:46.297219 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:35488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdNqQpVkWug9HeOt9I2AAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:47.459450 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:35498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdN6TCbgAP5jq5TehAAQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:49.201916 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:35514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdOKQpVkWug9HeOt9I2QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:50.625195 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:60134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdOlajLEzk2WiQ-10mhwAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:51.933673 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdO_9ocpUE4ed4uDwF2gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:53.142333 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:60158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdPdSswJuvopo3lOhyhgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:54.493147 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:60164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdPrABkC4fWIHEf8EGcAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:55.840864 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:60166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdP9SswJuvopo3lOhyiAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:57.015889 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:60174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQUr9dMAiw-8KANNZ2gAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:58.338947 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:60178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQtSswJuvopo3lOhyigAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:59.495548 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:60190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQ9SswJuvopo3lOhyjAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:00.872990 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:37742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdREr9dMAiw-8KANNZ3wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.037389 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:37752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdRrysWC90G-1nBrBXOAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.041908 2026] [mime_magic:error] [pid 10651:tid 140411733534464] (70014)End of file found: [client 74.7.243.203:37752] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.670429 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:37760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdRrysWC90G-1nBrBXOQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:03.854900 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:37776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdR7ABkC4fWIHEf8EGcwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:05.048693 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:37780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdSbABkC4fWIHEf8EGdAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:05.857945 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:57038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdSf9ocpUE4ed4uDwF7AAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:07.162800 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:52148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdS8_BxrYCr4hPDw_91gAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:08.344528 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:48756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdTI6lpbStxTqkSkt97wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:08.661214 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:37784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdTLysWC90G-1nBrBXPAAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:11.803863 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdT46lpbStxTqkSkt98wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:14.210900 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:48782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdUqQpVkWug9HeOt9I5gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:14.415106 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:37800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdUs_BxrYCr4hPDw_92wAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:15.470093 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:48784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdU9SswJuvopo3lOhyjQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:17.923115 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:48800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdVLysWC90G-1nBrBXPgAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:19.406788 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:58856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdV7ysWC90G-1nBrBXQwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:20.651257 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:58870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdWLysWC90G-1nBrBXRwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:22.047484 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:58886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdWo6lpbStxTqkSkt99wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:25.144665 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:57516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdXbysWC90G-1nBrBXTAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:26.508153 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:58056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdXv9ocpUE4ed4uDwF9gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:28.736547 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.243.203:58060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdYKTCbgAP5jq5TehACwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:31.499027 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:58070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdYtSswJuvopo3lOhykgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:32.579881 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:58902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdZP9ocpUE4ed4uDwF-wAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:35.049093 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:46986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdZ8_BxrYCr4hPDw_93wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:36.404641 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:47000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdaI6lpbStxTqkSkt9-gAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:37.594126 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:47014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdaVajLEzk2WiQ-10mmwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:49.368961 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:39080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhddaTCbgAP5jq5TehAJwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:56.839287 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:36938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdfKTCbgAP5jq5TehALwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:58.900010 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:58132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdfo6lpbStxTqkSkt9_QAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:05.729507 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:42418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdhf9ocpUE4ed4uDwGEwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:11.522705 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:42420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdi8_BxrYCr4hPDw_96AAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:19.419297 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:38176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdk0r9dMAiw-8KANNaKgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:19.915250 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:35608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdk_9ocpUE4ed4uDwGHwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:44:22.948949 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:53340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdlrABkC4fWIHEf8EGkgAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:26.560931 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdmo6lpbStxTqkSkt-CAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:44.073182 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:53366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdrNSswJuvopo3lOhyuAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:45.412801 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:43932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdrUr9dMAiw-8KANNaQAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:45.414798 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.244.31:34694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhdrUr9dMAiw-8KANNaPwAAARg"]
[Mon Mar 16 16:44:48.254541 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:51234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdsLysWC90G-1nBrBXdAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:49.566734 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:57408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdsc_BxrYCr4hPDw_97wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:50.698808 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:57410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdso6lpbStxTqkSkt-EwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:52.011954 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:57416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtP9ocpUE4ed4uDwGIwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:53.295419 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:57422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtf9ocpUE4ed4uDwGJAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:55.567914 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:57426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtlajLEzk2WiQ-10mtgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:55.568237 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:43940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtrABkC4fWIHEf8EGogAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:56.859735 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhduLABkC4fWIHEf8EGpQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:58.076890 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:42738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdukr9dMAiw-8KANNaTAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:59.360780 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:42742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdu_9ocpUE4ed4uDwGJwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:00.605504 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:42756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdvP9ocpUE4ed4uDwGKQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:02.269046 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:42768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdvlajLEzk2WiQ-10muAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:03.439003 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:42772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdv1ajLEzk2WiQ-10mugAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:03.927071 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:45446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdv7ABkC4fWIHEf8EGrQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:45:04.851021 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:42780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdwP9ocpUE4ed4uDwGLAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:06.163919 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:42784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdwqQpVkWug9HeOt9I-AAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:08.363541 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:42790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdw6QpVkWug9HeOt9I-QAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:09.666225 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:42116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdxUr9dMAiw-8KANNaWAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:10.848030 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:42124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdxqTCbgAP5jq5TehAQwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:12.048114 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:42130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdyLysWC90G-1nBrBXdwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:13.443108 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdyY6lpbStxTqkSkt-FgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:14.622856 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:42142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdylajLEzk2WiQ-10mvQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:16.301942 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:42158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdy9SswJuvopo3lOhyugAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:17.671084 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:42172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdzbysWC90G-1nBrBXewAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:18.899707 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:36704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdzlajLEzk2WiQ-10mvgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:20.063237 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:36720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0M_BxrYCr4hPDw_99wAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:21.431270 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:36734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0c_BxrYCr4hPDw_9-AAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:23.031103 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:47874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0v9ocpUE4ed4uDwGOwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:23.031269 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:36746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0kr9dMAiw-8KANNaZgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:24.370462 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:34248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1FajLEzk2WiQ-10mvwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:24.463195 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:36748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1KQpVkWug9HeOt9I_QAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:25.833529 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:36758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1aTCbgAP5jq5TehARwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:27.102602 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:36764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd16QpVkWug9HeOt9I_gAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:28.434419 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:40030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd2FajLEzk2WiQ-10mwQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:29.634733 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:40034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd2VajLEzk2WiQ-10mwgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:32.043597 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:40048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd3Er9dMAiw-8KANNacAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:45:32.304564 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:34264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd3LABkC4fWIHEf8EGugAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:39.785504 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:40058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd47ABkC4fWIHEf8EGxwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:41.092052 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:42650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd5f9ocpUE4ed4uDwGPQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:42.270737 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd5o6lpbStxTqkSkt-IAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:43.563442 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:42660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd59SswJuvopo3lOhywAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:52.012542 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:40958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8LABkC4fWIHEf8EG1QAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:53.354261 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:60412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8bysWC90G-1nBrBXhQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:54.550847 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:60428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8qTCbgAP5jq5TehATQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:55.859426 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:60442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd86TCbgAP5jq5TehATgAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:57.059718 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:60456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd9aTCbgAP5jq5TehATwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:59.453361 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:60462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd97ABkC4fWIHEf8EG2gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:00.849457 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:35332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd-NSswJuvopo3lOhyxgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:03.118199 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:35346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd-6QpVkWug9HeOt9JAwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:05.435030 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:35360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd_bysWC90G-1nBrBXiwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:06.721971 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:35376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd_qQpVkWug9HeOt9JBAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:07.231456 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:42674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd__9ocpUE4ed4uDwGWwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:08.002589 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:35378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheANSswJuvopo3lOhyygAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:09.154734 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:35394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheAdSswJuvopo3lOhyzAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:10.479658 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:58186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheAs_BxrYCr4hPDw_-AQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:11.708506 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:58196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheA0r9dMAiw-8KANNakwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:13.031498 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:58208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheBdSswJuvopo3lOhy0QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:13.167518 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:42740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheBY6lpbStxTqkSkt-KQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:15.267243 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:58212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheB_9ocpUE4ed4uDwGXwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:16.570636 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:58228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCFajLEzk2WiQ-10m1gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:16.967395 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:42754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCNSswJuvopo3lOhy2AAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:17.776408 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:58240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCY6lpbStxTqkSkt-KgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:21.255757 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.243.203:58250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheDc_BxrYCr4hPDw_-BQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:22.587075 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:46610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheDv9ocpUE4ed4uDwGYAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:23.932377 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:46618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheD7ysWC90G-1nBrBXjwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:24.350884 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.228.16:37972] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abheEI6lpbStxTqkSkt-LgAAAlc"]
[Mon Mar 16 16:46:25.122768 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:46626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheEY6lpbStxTqkSkt-LwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:26.432920 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:46628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheElajLEzk2WiQ-10m2wAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:27.585494 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:46636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheE6TCbgAP5jq5TehAYAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:30.061178 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:46650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheFv9ocpUE4ed4uDwGZAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:31.352870 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:51376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheF_9ocpUE4ed4uDwGZwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:32.643779 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:51390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheGM_BxrYCr4hPDw_-CQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:33.981028 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:51404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheGaQpVkWug9HeOt9JCwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:36.507783 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:51420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheG6QpVkWug9HeOt9JDQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:38.951134 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:51426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheHv9ocpUE4ed4uDwGbgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:40.274952 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:43634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheILysWC90G-1nBrBXlgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:46.375732 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:43636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheJY6lpbStxTqkSkt-OQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:47.820768 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:43648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheJ7ABkC4fWIHEf8EG5wAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:49.007598 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:43664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheKbysWC90G-1nBrBXmAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:49.796238 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:43108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheKaTCbgAP5jq5TehAdAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:51.089427 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:51334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheK9SswJuvopo3lOhy3QAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:51.650118 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheK0r9dMAiw-8KANNaugAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:52.299439 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:51340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLKQpVkWug9HeOt9JEwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:52.979035 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLFajLEzk2WiQ-10m4AAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:53.535436 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:51356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLc_BxrYCr4hPDw_-EAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:54.160683 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:47504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLv9ocpUE4ed4uDwGcQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:54.830991 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:51372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLv9ocpUE4ed4uDwGcgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:57.227225 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheMf9ocpUE4ed4uDwGdgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:01.567418 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:37964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheNbABkC4fWIHEf8EG7QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:04.058025 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:37974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheNrABkC4fWIHEf8EG7wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:05.459891 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:37982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheOdSswJuvopo3lOhy4QAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:06.752606 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:37988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheOv9ocpUE4ed4uDwGgQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:07.950378 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:37996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheO6QpVkWug9HeOt9JFgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.347145 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:35950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePc_BxrYCr4hPDw_-FAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.551847 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:35950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePc_BxrYCr4hPDw_-FQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.901079 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePf9ocpUE4ed4uDwGhgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:11.190311 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:40092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheP7ysWC90G-1nBrBXoQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:12.054985 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:35966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQLysWC90G-1nBrBXogAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:12.516223 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:40106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQI6lpbStxTqkSkt-PwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:13.374928 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:35974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQf9ocpUE4ed4uDwGhwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:16.173706 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:40116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheREr9dMAiw-8KANNaygAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:16.495061 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:35990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheRLABkC4fWIHEf8EG9wAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:19.015985 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:36006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheRdSswJuvopo3lOhy5QAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:20.392500 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:59196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSLABkC4fWIHEf8EG-wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:21.596084 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:59210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSY6lpbStxTqkSkt-QgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:22.930391 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:59212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSqTCbgAP5jq5TehAgAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:24.188367 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:59226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheTLABkC4fWIHEf8EG_gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:26.787036 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:59234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheTrysWC90G-1nBrBXrQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:31.431323 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:59236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheU7ysWC90G-1nBrBXsgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:32.768790 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:35864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheVM_BxrYCr4hPDw_-HAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:33.906283 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:35868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheVdSswJuvopo3lOhy6gAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:35.253422 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:35882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheV_9ocpUE4ed4uDwGjwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:36.471871 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheWEr9dMAiw-8KANNa1AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:37.876365 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:35886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheWaQpVkWug9HeOt9JHwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:39.088587 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:50068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheW1ajLEzk2WiQ-10m9QAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:41.717125 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:50082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheXdSswJuvopo3lOhy8AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:43.022052 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:50084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheX6QpVkWug9HeOt9JIQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:44.202301 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:50096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheYEr9dMAiw-8KANNa1wAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:45.439661 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:50102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheYaQpVkWug9HeOt9JIgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:47.943076 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheY46lpbStxTqkSkt-TgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:49.473835 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:39972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheZf9ocpUE4ed4uDwGlQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:50.733553 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:39976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheZlajLEzk2WiQ-10m-wAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:52.115830 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheaP9ocpUE4ed4uDwGlwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:53.327463 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:39990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheaUr9dMAiw-8KANNa3QAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:54.569802 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:40004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhearysWC90G-1nBrBXuAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:55.879392 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:40016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhea9SswJuvopo3lOhy8gAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:58.395108 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:40022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheblajLEzk2WiQ-10m_gAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:59.854961 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:40882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheb7ysWC90G-1nBrBXuwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:00.533861 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:40122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecKTCbgAP5jq5TehAowAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:01.102309 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:40890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecUr9dMAiw-8KANNa4AAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:03.035909 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:40902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecrysWC90G-1nBrBXvQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:03.039994 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecdSswJuvopo3lOhy-AAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:04.303565 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:40916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedI6lpbStxTqkSkt-UwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:04.367844 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:49902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedKQpVkWug9HeOt9JKgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:05.765804 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:40920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedaTCbgAP5jq5TehApAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:05.827178 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:49914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedY6lpbStxTqkSkt-VAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:07.164534 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:40934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhed6TCbgAP5jq5TehApQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:08.243461 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:49924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeFajLEzk2WiQ-10nBAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:08.386640 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:48938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeKTCbgAP5jq5TehApwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:09.600770 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeVajLEzk2WiQ-10nBQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:10.671586 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:48952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhees_BxrYCr4hPDw_-LwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:11.003134 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:60088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhee9SswJuvopo3lOhy-wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:12.309171 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:60102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhefI6lpbStxTqkSkt-WAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:13.959274 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:48966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhefbysWC90G-1nBrBXwwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:16.486440 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhegP9ocpUE4ed4uDwGnwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:18.863361 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:48978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhegqQpVkWug9HeOt9JMQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:23.885057 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheh46lpbStxTqkSkt-XQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:25.335438 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:37250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheiUr9dMAiw-8KANNa6AAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:27.960070 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:37256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhei6QpVkWug9HeOt9JOQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:29.314044 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:37264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhejf9ocpUE4ed4uDwGpgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:32.697911 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:32876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhekLABkC4fWIHEf8EHNwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:37.279258 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:51216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhelbysWC90G-1nBrBX1gAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:39.666978 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:32890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhel7ABkC4fWIHEf8EHSQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:40.951185 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:35416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhemM_BxrYCr4hPDw_-MwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:42.136619 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:37872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhemrABkC4fWIHEf8EHTgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:48.782448 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:37874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhen8_BxrYCr4hPDw_-OAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:57.256036 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:35418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqUr9dMAiw-8KANNbAAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:57.361192 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:36062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqUr9dMAiw-8KANNbAQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:58.710319 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:39030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqv9ocpUE4ed4uDwGqwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:59.958905 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:39042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheq6QpVkWug9HeOt9JPgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:01.252128 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:39046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abherVajLEzk2WiQ-10nFAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:02.604729 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:39060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abherqTCbgAP5jq5TehAtAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:03.827663 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:39070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abher_9ocpUE4ed4uDwGrAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:05.169327 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhesdSswJuvopo3lOhzCAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:05.359254 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:50196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhesY6lpbStxTqkSkt-aAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:49:06.600280 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:39086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhess_BxrYCr4hPDw_-OgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:07.971329 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:39098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhes1ajLEzk2WiQ-10nFgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:10.335635 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:43420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhets_BxrYCr4hPDw_-PgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:12.902119 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:43436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheuI6lpbStxTqkSkt-bQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:15.462130 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:43452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheu0r9dMAiw-8KANNbCAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:16.779103 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:43466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhevLABkC4fWIHEf8EHcwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:18.003307 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhevqTCbgAP5jq5TehAtwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:20.463320 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:50022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhewNSswJuvopo3lOhzDQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:22.997781 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:50026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhews_BxrYCr4hPDw_-RwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:24.443117 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:50040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhexP9ocpUE4ed4uDwGsAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:26.736102 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:50050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhexo6lpbStxTqkSkt-cQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:30.751502 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:36268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheyrABkC4fWIHEf8EHfwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:32.111427 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:36270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhezLysWC90G-1nBrBX5QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:33.601236 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:36286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhezaTCbgAP5jq5TehAvAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:39.450487 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:36294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe01ajLEzk2WiQ-10nIQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:40.787790 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe1KTCbgAP5jq5TehAvgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:42.020661 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:33600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe1lajLEzk2WiQ-10nIgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:43.374892 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:33612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe18_BxrYCr4hPDw_-TgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:46.996531 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:33622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe2tSswJuvopo3lOhzFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:48.338997 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:38366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe3I6lpbStxTqkSkt-dwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:49.628358 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe3aQpVkWug9HeOt9JeQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:52.052587 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:38388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe4LysWC90G-1nBrBX6gAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:53.424366 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:38398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe4dSswJuvopo3lOhzGwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:55.795781 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:38412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe48_BxrYCr4hPDw_-VQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:57.407499 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:38424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe5bysWC90G-1nBrBX7AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:58.750216 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:51174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe5v9ocpUE4ed4uDwGtwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:00.016988 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:51178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe6KTCbgAP5jq5TehAwQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:01.628350 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:51188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe6f9ocpUE4ed4uDwGugAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:03.292045 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:51198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe67ysWC90G-1nBrBX7wAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:04.621044 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:51206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe7KQpVkWug9HeOt9JiwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:05.960506 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:51218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe7bABkC4fWIHEf8EHkQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:08.435523 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:51226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe8FajLEzk2WiQ-10nLgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:09.873046 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:42686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe8bABkC4fWIHEf8EHlQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:11.157343 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe87ABkC4fWIHEf8EHlgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:12.487906 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:42696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe9KQpVkWug9HeOt9JkgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:14.809291 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:42708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe9qQpVkWug9HeOt9JmQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:17.269775 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe-P9ocpUE4ed4uDwGwAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:18.648660 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:60640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe-o6lpbStxTqkSkt-kAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:24.427312 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:60656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfAP9ocpUE4ed4uDwG1gAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:25.771482 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:60666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfAbABkC4fWIHEf8EHpAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:27.027585 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:60670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfA6TCbgAP5jq5TehAywAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:28.350197 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfBI6lpbStxTqkSkt-mQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:30.837175 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:46140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfBrysWC90G-1nBrBX_QAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:34.124428 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:46154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfCtSswJuvopo3lOhzLAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:35.531463 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:46168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfC0r9dMAiw-8KANNbKQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:37.890112 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfDbysWC90G-1nBrBYAQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:43.507656 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:40930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfE0r9dMAiw-8KANNbMwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:44.857146 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:40940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfFEr9dMAiw-8KANNbNAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:46.105415 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:40946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfFrABkC4fWIHEf8EHrAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:51.224425 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:40958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfGs_BxrYCr4hPDw_-awAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:52.581708 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:34842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfHLysWC90G-1nBrBYBgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:53.770922 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:34852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfHdSswJuvopo3lOhzNwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:55.079110 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:34860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfH6TCbgAP5jq5TehA1QAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:55.079597 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:39014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfH6QpVkWug9HeOt9JwAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:50:56.395436 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:45426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfILABkC4fWIHEf8EHrgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:58.576370 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:34866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfIs_BxrYCr4hPDw_-bwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:59.947513 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:46532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfI1ajLEzk2WiQ-10nSAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:03.046092 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:46548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfJ9SswJuvopo3lOhzOwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:03.335600 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:45440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfJ6TCbgAP5jq5TehA2wAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:04.371441 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:46556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfKKQpVkWug9HeOt9JwgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:06.780997 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:46572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfKqQpVkWug9HeOt9JxAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:10.311106 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:52684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfLkr9dMAiw-8KANNbRwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:10.507475 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:46774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfLs_BxrYCr4hPDw_-dQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:14.067408 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:46790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfMlajLEzk2WiQ-10nTgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:24.699596 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.228.16:40486] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhfPP9ocpUE4ed4uDwG9AAAAhg"]
[Mon Mar 16 16:51:29.984953 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:34036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfQf9ocpUE4ed4uDwG_wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:32.423641 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:36196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfRKQpVkWug9HeOt9J0wAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:36.671011 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSI6lpbStxTqkSkt-6AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:38.014595 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:52116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSrysWC90G-1nBrBYHAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:38.227766 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:36206] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSrABkC4fWIHEf8EHyAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:42.947692 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:36212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfTqQpVkWug9HeOt9J2wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:44.323682 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:38928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfUM_BxrYCr4hPDw_-gAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:47.877267 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:38936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfU_9ocpUE4ed4uDwHCQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:49.176519 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.243.203:38942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfVUr9dMAiw-8KANNbWAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:59.527408 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfX7ysWC90G-1nBrBYJwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:00.928203 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:41232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfYKTCbgAP5jq5TehA7wAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:02.180436 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:41248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfYrABkC4fWIHEf8EHzgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:03.385923 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:41256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfY6TCbgAP5jq5TehA8AAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:04.759288 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:41266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfZKTCbgAP5jq5TehA8gAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:10.743764 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfarysWC90G-1nBrBYMAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:26.984839 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:42688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfeqQpVkWug9HeOt9J8AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:30.446184 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfftSswJuvopo3lOhzigAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:34.158491 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:33542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfgs_BxrYCr4hPDw_-jAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:39.526889 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:33550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfh_9ocpUE4ed4uDwHGAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:47.132676 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfj0r9dMAiw-8KANNbhAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:06.910290 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:47530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfokr9dMAiw-8KANNbpAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:53:21.788539 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:54436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfsY6lpbStxTqkSkt_LgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:53:37.654720 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:38190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfwaQpVkWug9HeOt9KCQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:40.255883 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:41836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfxLysWC90G-1nBrBYPwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:53:55.116976 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:53664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf07ABkC4fWIHEf8EILAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:56.458663 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:42226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf1LABkC4fWIHEf8EILQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:01.074423 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:42234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf2aTCbgAP5jq5TehBCwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:11.674154 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:41036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf46QpVkWug9HeOt9KGwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:14.243639 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:52900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf5o6lpbStxTqkSkt_PgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:14.355092 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:41848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf5tSswJuvopo3lOhzvwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:16.839060 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:52902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf6Er9dMAiw-8KANNb2wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:18.832692 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:39206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf6tSswJuvopo3lOhzxQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:19.261829 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:52906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf68_BxrYCr4hPDw_-nQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:20.604780 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:46950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7KQpVkWug9HeOt9KHAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:21.279162 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:33700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7Ur9dMAiw-8KANNb4AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:22.679559 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:33704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7kr9dMAiw-8KANNb4gAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:22.956492 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:46956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7rysWC90G-1nBrBYSgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:25.280904 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:46962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf8Ur9dMAiw-8KANNb5wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:28.522664 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:33714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf9FajLEzk2WiQ-10nmAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:54:32.136610 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:45094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf-M_BxrYCr4hPDw_-owAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:46.290461 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.244.31:57008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhgBo6lpbStxTqkSkt_RgAAAkI"]
[Mon Mar 16 16:55:03.411459 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:45096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgF1ajLEzk2WiQ-10nuQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:55:06.042211 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:44902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgGlajLEzk2WiQ-10nvQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:55:09.635429 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:44910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgHUr9dMAiw-8KANNcBAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:56:00.200427 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:46974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUNSswJuvopo3lOh0IgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:01.511322 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUdSswJuvopo3lOh0JAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:02.762999 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:41098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUkr9dMAiw-8KANNcNQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:04.211134 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:41104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVEr9dMAiw-8KANNcNwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:05.414127 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:41116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVc_BxrYCr4hPDw_-rQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:06.545431 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.243.203:41128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVlajLEzk2WiQ-10nzwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:20.556240 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:41130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgZLABkC4fWIHEf8EIVgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:26.238145 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.228.16:52806] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhgatSswJuvopo3lOh0JwAAAIc"]
[Mon Mar 16 16:56:31.307419 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgb0r9dMAiw-8KANNcUAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:35.080804 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:38582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgc6QpVkWug9HeOt9KLgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:56:36.119511 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgdP9ocpUE4ed4uDwHYgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:36.561155 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:38588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgdKQpVkWug9HeOt9KLwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:45.503152 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:58228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgff9ocpUE4ed4uDwHbAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:47.962540 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:58952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgf6TCbgAP5jq5TehBbgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:58.802187 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:38602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgirysWC90G-1nBrBYbwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:00.105699 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjI6lpbStxTqkSkt_ZwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:01.266310 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:36368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjbABkC4fWIHEf8EIZAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:02.456015 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:58958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjrABkC4fWIHEf8EIZgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:57:03.758466 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:56086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgj9SswJuvopo3lOh0LwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:06.044260 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:36384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgkrABkC4fWIHEf8EIagAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:57:33.391902 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:36396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgrc_BxrYCr4hPDw_-1gAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:34.789320 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:59084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgrs_BxrYCr4hPDw_-1wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:36.055837 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:59092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsM_BxrYCr4hPDw_-2QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:37.415311 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:59104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsVajLEzk2WiQ-10n3AAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:38.692912 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:52738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsrysWC90G-1nBrBYegAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:39.885607 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:52744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgs7ysWC90G-1nBrBYfQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:41.307491 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:52760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgtVajLEzk2WiQ-10n3QAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:44.312654 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:52768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguKTCbgAP5jq5TehBiQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:45.576603 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:56100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguUr9dMAiw-8KANNccwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:45.658917 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:52776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguaQpVkWug9HeOt9KWwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:46.875043 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:52782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgulajLEzk2WiQ-10n3gAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:48.269038 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:45448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvM_BxrYCr4hPDw_-3AAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:49.473450 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:45452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvbysWC90G-1nBrBYhAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:50.290212 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:59608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvrysWC90G-1nBrBYhwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:50.830428 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:45462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvlajLEzk2WiQ-10n4gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:51.669401 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:57850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgv0r9dMAiw-8KANNcdQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:52.010795 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgwP9ocpUE4ed4uDwHdwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:53.417168 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgwdSswJuvopo3lOh0NwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:55.738146 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:45480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgw_9ocpUE4ed4uDwHegAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:58.063649 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgxaTCbgAP5jq5TehBiwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:00.342840 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:33552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgx6QpVkWug9HeOt9KaQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:01.718788 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:33558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgydSswJuvopo3lOh0PAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:02.931592 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:33568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgykr9dMAiw-8KANNcdwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:04.375394 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:33574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgzKTCbgAP5jq5TehBjgAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:06.687739 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgzqQpVkWug9HeOt9KeAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:08.048770 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:33602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg0NSswJuvopo3lOh0QgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:09.302001 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:45380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg0Ur9dMAiw-8KANNceQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:12.033953 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:45396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1Er9dMAiw-8KANNcfQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:13.380888 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:45406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1Y6lpbStxTqkSkt_dwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:14.572065 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:45420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1tSswJuvopo3lOh0QwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:17.139263 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg2dSswJuvopo3lOh0RQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:21.316555 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:58980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg3Y6lpbStxTqkSkt_fwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:26.048158 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:58990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg4tSswJuvopo3lOh0TAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:27.365223 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:59006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg446lpbStxTqkSkt_gQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:28.617252 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:48356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg5KTCbgAP5jq5TehBpQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:29.938037 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:48366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg5Ur9dMAiw-8KANNciAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:31.137313 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:48368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg50r9dMAiw-8KANNciQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:37.095568 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:48374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg7Ur9dMAiw-8KANNcjwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:40.197635 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:60224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg8FajLEzk2WiQ-10n5gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:44.989711 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:60234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg9P9ocpUE4ed4uDwHgAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:07.336150 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:60238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhC7ABkC4fWIHEf8EI0wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:59:24.530529 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:53864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhHLABkC4fWIHEf8EI-QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:27.016431 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhH_9ocpUE4ed4uDwHkwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:28.439409 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:52502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhIP9ocpUE4ed4uDwHlAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:37.018437 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:52512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhKbABkC4fWIHEf8EJEAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:42.763152 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:59546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhLrABkC4fWIHEf8EJGwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:46.513334 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:59552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhMkr9dMAiw-8KANNcoQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:46.867373 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:37896] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhhMrABkC4fWIHEf8EJIQAAAFg"]
[Mon Mar 16 17:00:31.124445 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:59560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhX7ABkC4fWIHEf8EJXAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:00:33.723789 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:53202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhYdSswJuvopo3lOh0ZQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:00:40.931203 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:53208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhaP9ocpUE4ed4uDwHuwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:42.343021 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:55758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhaqTCbgAP5jq5TehB3AAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:43.611104 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhha0r9dMAiw-8KANNcqQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:45.009124 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:55772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhbdSswJuvopo3lOh0ZgAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:47.399315 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:55788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhb6QpVkWug9HeOt9K1AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:48.802797 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:45366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhcKQpVkWug9HeOt9K1QAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:54.465004 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:45374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhdqQpVkWug9HeOt9K2wAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:56.979284 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:45384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhheLysWC90G-1nBrBYxgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:58.305244 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:39244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhheqQpVkWug9HeOt9K3gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:03.332107 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:39246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhf46lpbStxTqkSkt_nQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:04.641444 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:39256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhgEr9dMAiw-8KANNcqwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:06.971591 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:39264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhgv9ocpUE4ed4uDwH1AAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:08.335110 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:58378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhhI6lpbStxTqkSkt_ngAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:09.526754 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:58390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhhc_BxrYCr4hPDw_-_AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:19.676069 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:58400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhj7ABkC4fWIHEf8EJbAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:21.046672 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:44664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhkY6lpbStxTqkSkt_oAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:22.297553 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:44672] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhkv9ocpUE4ed4uDwH6gAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:24.335831 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:44676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhk0r9dMAiw-8KANNcsAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:25.663527 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:44686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhlY6lpbStxTqkSkt_oQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:27.055439 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:44700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhl6QpVkWug9HeOt9K4AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:27.163636 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.228.16:36326] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhhl0r9dMAiw-8KANNcsQAAAQQ"]
[Mon Mar 16 17:01:28.271659 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:46182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhmKTCbgAP5jq5TehB4QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:29.595219 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:46186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhmbysWC90G-1nBrBY3QAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:39.319195 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:46188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhho7ABkC4fWIHEf8EJdwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:40.644860 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:47872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhpLABkC4fWIHEf8EJeAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:41.795679 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhpf9ocpUE4ed4uDwH_wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:43.115773 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhp8_BxrYCr4hPDw__BAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:50.989872 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:47892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhrlajLEzk2WiQ-10oJgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:54.519451 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:56936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhsrABkC4fWIHEf8EJhwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:57.045590 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:56950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhtdSswJuvopo3lOh0fAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:58.430330 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:59824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhtqTCbgAP5jq5TehB5gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:59.695338 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:59828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhht6QpVkWug9HeOt9K6wAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:06.585528 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:59844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhvdSswJuvopo3lOh0ggAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:08.996728 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:59846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhwFajLEzk2WiQ-10oKwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:10.339133 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:41018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhwtSswJuvopo3lOh0hAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:11.559787 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:41022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhw_9ocpUE4ed4uDwIHwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:19.751060 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:41032] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhy8_BxrYCr4hPDw__HQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:21.116407 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:41002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhzVajLEzk2WiQ-10oLwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:22.419194 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:41016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhzlajLEzk2WiQ-10oMAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:23.342549 2026] [access_compat:error] [pid 29802:tid 140411733534464] [client 45.94.31.197:51364] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 17:02:38.482012 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh3v9ocpUE4ed4uDwINQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:02:41.585963 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:39210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh4c_BxrYCr4hPDw__IwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:02:48.607204 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:39212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh6NSswJuvopo3lOh0lgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:02:52.143340 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:49636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh7LABkC4fWIHEf8EJowAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:03:26.455491 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:49646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiDs_BxrYCr4hPDw__QwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:04:39.691096 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:55660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiV6TCbgAP5jq5TehCQgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:04:50.251710 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.244.31:35018] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhiYrABkC4fWIHEf8EKEQAAAEA"]
[Mon Mar 16 17:06:02.831552 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:46748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiqrABkC4fWIHEf8EKagAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:11.810361 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:39968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhis7ysWC90G-1nBrBZlgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:13.243299 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:42042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhitc_BxrYCr4hPDw__jAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:19.232755 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:42054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiu8_BxrYCr4hPDw__mgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:23.342378 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:60528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhivqTCbgAP5jq5TehCTgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:26.884221 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:60544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiwqQpVkWug9HeOt9LdgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:28.193015 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:46394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhixLABkC4fWIHEf8EKawAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:28.266555 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.228.16:50178] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhixI6lpbStxTqkSkuAAQAAAlc"]
[Mon Mar 16 17:06:35.263004 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:46404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiy6TCbgAP5jq5TehCVwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:43.258568 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:46420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhi00r9dMAiw-8KANNc-QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:07:13.197397 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:45694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhi8c_BxrYCr4hPDw__9gAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:07:55.782539 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:34832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjG7ysWC90G-1nBrBZ4wAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:08:04.814335 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:41198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjJKQpVkWug9HeOt9LhwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:08:08.367876 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjKEr9dMAiw-8KANNdCgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:08:55.622377 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjV0r9dMAiw-8KANNdOgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:09:00.819166 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:47756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjXLABkC4fWIHEf8EK5AAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:11.843857 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:35440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjZ7ABkC4fWIHEf8EK7QAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:13.131507 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:38680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjac_BxrYCr4hPDw8AJQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:14.737898 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:38686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjaqQpVkWug9HeOt9LjQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:16.052875 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:38694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbLABkC4fWIHEf8EK7gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:17.458637 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbbABkC4fWIHEf8EK7wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:18.672877 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:38712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbrABkC4fWIHEf8EK8AAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:20.033277 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:38726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcP9ocpUE4ed4uDwImgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:21.317397 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcUr9dMAiw-8KANNdPQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:22.707270 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:44752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcqQpVkWug9HeOt9LjgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:23.923249 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:44754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjc6TCbgAP5jq5TehChgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:25.279035 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:44756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjdVajLEzk2WiQ-10onwAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:26.616766 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:44772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjdrysWC90G-1nBrBZ9QAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:27.863489 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:44776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjd9SswJuvopo3lOh05wAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:29.225535 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:44790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjeVajLEzk2WiQ-10ooQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:30.631865 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:45776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjerysWC90G-1nBrBZ9gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:31.814986 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:45782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhje6TCbgAP5jq5TehChwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:33.031247 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:45784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjfVajLEzk2WiQ-10opAAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:34.321587 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:45798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjflajLEzk2WiQ-10opwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:35.650355 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.243.203:45812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjf0r9dMAiw-8KANNdPwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:36.830764 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:45816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjgEr9dMAiw-8KANNdQAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:38.159460 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:45826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjgqQpVkWug9HeOt9LlQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:39.556105 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:45834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjg8_BxrYCr4hPDw8AKQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:40.794044 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:37962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjhFajLEzk2WiQ-10oqAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:41.987378 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:37978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjhdSswJuvopo3lOh06QAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:43.365522 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.243.203:37984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjh8_BxrYCr4hPDw8AKgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:44.641950 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:37990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjiEr9dMAiw-8KANNdQwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:45.965796 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:38006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjibysWC90G-1nBrBZ_QAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:47.227801 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:38022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhji6QpVkWug9HeOt9LlwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:48.627505 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.243.203:38026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjjM_BxrYCr4hPDw8AKwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:49.837511 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:38038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjjdSswJuvopo3lOh06gAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:51.171289 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:53964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjj7ysWC90G-1nBrBZ_gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:51.206891 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:60578] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhjj9SswJuvopo3lOh07AAAAIY"]
[Mon Mar 16 17:09:52.394251 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:53980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkM_BxrYCr4hPDw8ALwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:53.682998 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:53982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkaTCbgAP5jq5TehCjQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:54.869612 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:53996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkrABkC4fWIHEf8EK9gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:56.162638 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:53998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlP9ocpUE4ed4uDwIvgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:57.362338 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:54008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlf9ocpUE4ed4uDwIwAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:59.074603 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:54022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlv9ocpUE4ed4uDwIxAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:00.450549 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:49506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjmKQpVkWug9HeOt9LnQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:01.799615 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:49510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjmaQpVkWug9HeOt9LnwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:03.201276 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:49522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjm0r9dMAiw-8KANNdSAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:03.594103 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:51230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjm_9ocpUE4ed4uDwIzQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:04.444796 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:49528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjnLysWC90G-1nBrBaAgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:05.791320 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:49540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjnaQpVkWug9HeOt9LoAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:07.002976 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:49542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjn7ABkC4fWIHEf8EK_QAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:08.326032 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:49558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjoP9ocpUE4ed4uDwIzgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:09.564557 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:49564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjobABkC4fWIHEf8ELBAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:10.756469 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:57808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjorABkC4fWIHEf8ELBgAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:10.967519 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:41728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjov9ocpUE4ed4uDwI0gAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:12.114512 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:42944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpNSswJuvopo3lOh07wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:12.340589 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:41740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpKQpVkWug9HeOt9LoQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:13.592727 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:41756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpVajLEzk2WiQ-10orQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:14.833413 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:41766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjps_BxrYCr4hPDw8AMwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:16.220498 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:41782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqI6lpbStxTqkSkuAcAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:17.543413 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:41796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqUr9dMAiw-8KANNdTAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:18.871874 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:41806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqtSswJuvopo3lOh08gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:20.114590 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:45528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrLABkC4fWIHEf8ELBwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:21.474760 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.243.203:45538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrc_BxrYCr4hPDw8ANQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:22.666993 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:45544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrrABkC4fWIHEf8ELCAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:23.936378 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:45548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjr7ABkC4fWIHEf8ELCQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:25.166211 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:45556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjsY6lpbStxTqkSkuAcwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:26.527409 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:45568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjstSswJuvopo3lOh0-gAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:27.710751 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:45584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjs0r9dMAiw-8KANNdTQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:29.094535 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjtbABkC4fWIHEf8ELDwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:30.298048 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:45532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjtrysWC90G-1nBrBaCwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:31.663762 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:45538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjt7ysWC90G-1nBrBaDAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:32.920311 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:45554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjuLABkC4fWIHEf8ELEgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:34.167191 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:45560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjurysWC90G-1nBrBaDQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:35.453044 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:45568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhju7ysWC90G-1nBrBaDgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:36.907360 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:45576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjvNSswJuvopo3lOh0_QAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:38.140300 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:45590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjvs_BxrYCr4hPDw8AOAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:39.368849 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:45594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjv1ajLEzk2WiQ-10oswAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:40.713298 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:32852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwLABkC4fWIHEf8ELEwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:41.999996 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:32866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwbABkC4fWIHEf8ELFQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:42.744390 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:42958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwqQpVkWug9HeOt9LvAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:43.211306 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:32868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjw8_BxrYCr4hPDw8AOgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:44.140937 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:35300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxFajLEzk2WiQ-10otAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:44.551902 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:32872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxKTCbgAP5jq5TehCowAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:45.959866 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:32886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxY6lpbStxTqkSkuAdQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:47.087067 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:32898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjx7ysWC90G-1nBrBaDwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:48.475202 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:32904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjyLABkC4fWIHEf8ELGQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:49.821318 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:32920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjyUr9dMAiw-8KANNdVAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:51.137037 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:56842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjy6TCbgAP5jq5TehCrwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:55.327310 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:56854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjzLysWC90G-1nBrBaEAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:56.764603 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:56870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj0I6lpbStxTqkSkuAfgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:58.063146 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:56878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj0o6lpbStxTqkSkuAgAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:59.248820 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:56892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj07ABkC4fWIHEf8ELHAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:00.653786 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:49524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj1I6lpbStxTqkSkuAhAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:01.933378 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:49532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj1bABkC4fWIHEf8ELHwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:03.133233 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:49538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj18_BxrYCr4hPDw8APwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:04.480200 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:49552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2FajLEzk2WiQ-10ouwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:05.656935 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:49566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2dSswJuvopo3lOh1AwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:06.975648 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:49572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2o6lpbStxTqkSkuAhQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:08.351814 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:49582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj3KQpVkWug9HeOt9LwAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:09.624898 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:49598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj3dSswJuvopo3lOh1BQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:11.042260 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:59654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj39SswJuvopo3lOh1BgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:12.277311 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:59662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj4NSswJuvopo3lOh1CAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:13.492678 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:59670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj4VajLEzk2WiQ-10ovQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:18.651318 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj5rABkC4fWIHEf8ELJgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:19.986557 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj5_9ocpUE4ed4uDwI1AAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:22.967629 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:47484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj6tSswJuvopo3lOh1DAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:24.449766 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:47500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj7Er9dMAiw-8KANNddQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:25.853830 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:47510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj7aTCbgAP5jq5TehCyQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:27.210990 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:47520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj70r9dMAiw-8KANNdeQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:28.527136 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:47534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj8LABkC4fWIHEf8ELKgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:29.937041 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:47546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj8bABkC4fWIHEf8ELKwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:31.186251 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.243.203:41572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj80r9dMAiw-8KANNdgQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:31.643111 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.228.16:51838] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhj87ABkC4fWIHEf8ELLAAAAEA"]
[Mon Mar 16 17:11:32.476423 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:41586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj9LysWC90G-1nBrBaGwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:34.754766 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:41602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj9s_BxrYCr4hPDw8ARQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:36.146273 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:41604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj-KQpVkWug9HeOt9LxAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:38.559531 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:41618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj-rysWC90G-1nBrBaHwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:40.348678 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_Er9dMAiw-8KANNdjAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:41.076423 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:41632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_Ur9dMAiw-8KANNdjQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:42.516699 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:40130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_rysWC90G-1nBrBaIwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:43.876325 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:40140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj__9ocpUE4ed4uDwI1QAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:45.045652 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:40148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkAf9ocpUE4ed4uDwI1wAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:46.435425 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:40156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkAqTCbgAP5jq5TehC3gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:48.995250 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkBP9ocpUE4ed4uDwI2gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:50.327881 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkBrABkC4fWIHEf8ELMwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:51.688197 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.243.203:33120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkB8_BxrYCr4hPDw8ASQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:52.986116 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:33126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkCFajLEzk2WiQ-10owwAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:54.382051 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:33136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkClajLEzk2WiQ-10oxQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:55.604605 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:33152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkC7ABkC4fWIHEf8ELNQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:56.966893 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:33154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkDEr9dMAiw-8KANNdlwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:58.165696 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:33170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkDqQpVkWug9HeOt9LyAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:00.199164 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:33178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkD7ABkC4fWIHEf8ELNgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:02.699092 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:42390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkEqQpVkWug9HeOt9LygAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:04.016465 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:42404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFP9ocpUE4ed4uDwI3AAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:05.264944 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:42414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFf9ocpUE4ed4uDwI3gAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:06.621210 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:42426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFv9ocpUE4ed4uDwI4gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:09.051691 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:42430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkGf9ocpUE4ed4uDwI5AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:12.842043 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkHKTCbgAP5jq5TehC9AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:14.193993 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:52154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkHqTCbgAP5jq5TehC9gAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:15.431281 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:52168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkH6TCbgAP5jq5TehC-AAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:24.699446 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:52180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkKI6lpbStxTqkSkuAnQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:26.019403 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:52326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkKqQpVkWug9HeOt9L2AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:27.220419 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:52330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkK0r9dMAiw-8KANNdmgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:30.953098 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:52342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkLtSswJuvopo3lOh1PAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:36.197835 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:37422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkMtSswJuvopo3lOh1QwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:37.578949 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:37436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkNf9ocpUE4ed4uDwI7AAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:38.827837 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkNrysWC90G-1nBrBaKQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:40.136482 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:37456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkOI6lpbStxTqkSkuAogAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:48.545546 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:55988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQKQpVkWug9HeOt9L4QAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:49.889892 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:55996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQf9ocpUE4ed4uDwI9QAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:51.245331 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:42350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQ46lpbStxTqkSkuAowAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:52.563370 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:42356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkRFajLEzk2WiQ-10o0gAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:53.971794 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:42362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkRc_BxrYCr4hPDw8AWQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:55.325210 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:42376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkR6QpVkWug9HeOt9L4gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:56.698672 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:42386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkSLysWC90G-1nBrBaKwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:57.878292 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:42402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkSY6lpbStxTqkSkuApQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:59.196533 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:42412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkS7ysWC90G-1nBrBaLAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:00.586400 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:47504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkTI6lpbStxTqkSkuApgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:01.808245 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:47512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkTbysWC90G-1nBrBaLQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:08.997294 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:47524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkVLABkC4fWIHEf8ELTQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:10.372460 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:57870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkVqTCbgAP5jq5TehDEQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:11.790110 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:57872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkV9SswJuvopo3lOh1YwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:14.109304 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:57884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkWaTCbgAP5jq5TehDEgAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:15.527507 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:57888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkW46lpbStxTqkSkuAqgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:17.570878 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkXM_BxrYCr4hPDw8AYgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:18.902196 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:57898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkXqQpVkWug9HeOt9L6AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:19.711501 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:53698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkX9SswJuvopo3lOh1aQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:20.247266 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:35790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkYLABkC4fWIHEf8ELTgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:21.595113 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:35796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkYf9ocpUE4ed4uDwI9wAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:23.891212 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:35810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkY8_BxrYCr4hPDw8AZAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:25.183278 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:35824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZaTCbgAP5jq5TehDGAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:26.511542 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:35840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZrysWC90G-1nBrBaNwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:27.842825 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZ46lpbStxTqkSkuArQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:28.998263 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:35860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkaI6lpbStxTqkSkuArgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:30.343515 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.243.203:32806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkas_BxrYCr4hPDw8AZwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:31.562800 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:32822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhka8_BxrYCr4hPDw8AaQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:33.002997 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:32830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkbdSswJuvopo3lOh1awAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:34.240803 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:32838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkbo6lpbStxTqkSkuAsAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:35.444850 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkb6QpVkWug9HeOt9L6wAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:36.750450 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:32860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkcLABkC4fWIHEf8ELXwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:37.960283 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:32874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkcVajLEzk2WiQ-10o3wAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:39.271214 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:32890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkc1ajLEzk2WiQ-10o4QAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:39.578331 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkc7ABkC4fWIHEf8ELYgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:40.477992 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:33100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkdKQpVkWug9HeOt9L7AAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:41.670807 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:33102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkdVajLEzk2WiQ-10o4gAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:43.015862 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkd7ABkC4fWIHEf8ELZAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:44.263123 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.243.203:33122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkeEr9dMAiw-8KANNdxwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:45.587211 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:33126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkebABkC4fWIHEf8ELZQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:46.455689 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:49318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkev9ocpUE4ed4uDwI_wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:48.017130 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkfLABkC4fWIHEf8ELZwAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:49.374127 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.243.203:33136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkfc_BxrYCr4hPDw8AagAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:54.390255 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:49322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkgrysWC90G-1nBrBaQAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:55.193079 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:34202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkg6QpVkWug9HeOt9L9QAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:57.804182 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:55016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkhaTCbgAP5jq5TehDIgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:01.939562 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:34218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkiaQpVkWug9HeOt9MAQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:14:07.651728 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:34104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkj0r9dMAiw-8KANNd4AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:14:09.013519 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:41754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkkUr9dMAiw-8KANNd4gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:14:14.409590 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:41760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhklv9ocpUE4ed4uDwJAwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:14:16.924798 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:41766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkmLysWC90G-1nBrBaUQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:21.579810 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:51238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhknbysWC90G-1nBrBaXAAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:46.107735 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:51252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkttSswJuvopo3lOh1igAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:53.823139 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.244.31:48362] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhkvVajLEzk2WiQ-10o8AAAAoM"]
[Mon Mar 16 17:15:57.031577 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:36378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhk_dSswJuvopo3lOh1ygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:16:04.070719 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:41418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlBP9ocpUE4ed4uDwJHwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:06.655215 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:41426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlBc_BxrYCr4hPDw8AjwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:16:12.011168 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:41438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlDKQpVkWug9HeOt9MJAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:32.688651 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:55852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlIEr9dMAiw-8KANNeOAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:37.401659 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:54248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlJNSswJuvopo3lOh10wAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:16:38.797670 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:54260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlJqQpVkWug9HeOt9MLAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:43.395444 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlK9SswJuvopo3lOh11gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:59.867771 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:43614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlO_9ocpUE4ed4uDwJQwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:03.602458 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlP9SswJuvopo3lOh2AgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:17:04.970451 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:34412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlQFajLEzk2WiQ-10pLwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:09.763412 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:34414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlRaTCbgAP5jq5TehDYwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:17:13.493505 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:47396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlSaTCbgAP5jq5TehDaQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:17:47.176062 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:55518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhla7ysWC90G-1nBrBbFAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:50.851896 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:47018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlblajLEzk2WiQ-10pWgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:17:55.959480 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:47034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlc6TCbgAP5jq5TehDeQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:04.527434 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:47036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlfLysWC90G-1nBrBbIQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:18:06.118477 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:42942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlfs_BxrYCr4hPDw8A2gAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:18:08.466286 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlgP9ocpUE4ed4uDwJXwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:24.271488 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:41804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlkEr9dMAiw-8KANNeVQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:40.675344 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhloKQpVkWug9HeOt9MXgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:44.375533 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:36372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlpI6lpbStxTqkSkuBSgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:48.019186 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:36376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlqLysWC90G-1nBrBbJwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:57.050965 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlsf9ocpUE4ed4uDwJjgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:19:09.335873 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:53202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlvaTCbgAP5jq5TehDiQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:19:38.991494 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:55862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl2o6lpbStxTqkSkuBYAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:19:50.955279 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:40894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl5lajLEzk2WiQ-10pjgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:19:55.378932 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.244.31:41010] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhl6s_BxrYCr4hPDw8BWgAAAcE"]
[Mon Mar 16 17:20:00.321317 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:51956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl8LABkC4fWIHEf8EL9gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:03.697475 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.243.203:35404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl80r9dMAiw-8KANNebQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:29.335698 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:60950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmDY6lpbStxTqkSkuBhAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:20:32.947292 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmEKTCbgAP5jq5TehDngAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:20:35.953622 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:34084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmE9SswJuvopo3lOh2PwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:58.561788 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:34094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmKv9ocpUE4ed4uDwJ8gAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:20:59.905560 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:49422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmK6QpVkWug9HeOt9MdQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:01.101119 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmLbABkC4fWIHEf8EMBAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:02.455674 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:49432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmLkr9dMAiw-8KANNehwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:06.898970 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:49448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmMtSswJuvopo3lOh2SgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:08.307969 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:58620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmNP9ocpUE4ed4uDwJ8wAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:09.574711 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:58624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmNbABkC4fWIHEf8EMBgAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:11.947024 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:58626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmN46lpbStxTqkSkuBjAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:14.053518 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:58636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmOrysWC90G-1nBrBbgwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:15.390462 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:58638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmO6QpVkWug9HeOt9MeAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:16.595708 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:58644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmPKTCbgAP5jq5TehDqAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:17.941089 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:58648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmPc_BxrYCr4hPDw8BjQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:19.311908 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmP0r9dMAiw-8KANNelAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:20.569785 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:52200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQNSswJuvopo3lOh2TAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:21.914807 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:52214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQbABkC4fWIHEf8EMCwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:23.094633 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:52228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQ1ajLEzk2WiQ-10pnAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:24.479586 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:52242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmRNSswJuvopo3lOh2TgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:28.043786 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:52244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmSNSswJuvopo3lOh2UgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:29.499523 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:58304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmSVajLEzk2WiQ-10pogAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:31.895856 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:58312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmS1ajLEzk2WiQ-10ppgAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:33.244988 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:58314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmTf9ocpUE4ed4uDwJ-AAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:35.663986 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:58324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmT9SswJuvopo3lOh2WwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:38.223191 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:58336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmUdSswJuvopo3lOh2XAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:39.793992 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:47350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmU0r9dMAiw-8KANNesQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:42.191010 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:47366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmVrysWC90G-1nBrBbnAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:43.635183 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:47368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmV1ajLEzk2WiQ-10ptAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:45.199453 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:47380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmWc_BxrYCr4hPDw8BnQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:46.482130 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:47394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmWo6lpbStxTqkSkuBjgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:47.900177 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:47398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmW6TCbgAP5jq5TehDrAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:49.151504 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:44814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmXY6lpbStxTqkSkuBkQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:52.715671 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:44818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmYKTCbgAP5jq5TehDsgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:54.019376 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:44824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmYv9ocpUE4ed4uDwJ-wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:55.422331 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmY9SswJuvopo3lOh2YAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:56.644897 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:44846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmZNSswJuvopo3lOh2YQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:59.495369 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:44856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmZ7ABkC4fWIHEf8EMEAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:01.162687 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:34852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmaY6lpbStxTqkSkuBlgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:02.356422 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:34856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmarABkC4fWIHEf8EMEQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:03.699538 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:34868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhma0r9dMAiw-8KANNe1gAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:04.885231 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:34874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmbKTCbgAP5jq5TehDtAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:08.394321 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:34890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmcNSswJuvopo3lOh2ZQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:09.844875 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:58070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmcbABkC4fWIHEf8EMEwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:11.034395 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:58082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmc8_BxrYCr4hPDw8BpQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:13.433602 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:58086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmdbysWC90G-1nBrBbuwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:15.822906 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:58094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmd0r9dMAiw-8KANNe6gAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:17.107183 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:58106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmeaQpVkWug9HeOt9MhgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:19.130151 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:48744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmev9ocpUE4ed4uDwKBAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:22.707050 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:48750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmfkr9dMAiw-8KANNe-AAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:23.991104 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:48764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmf7ABkC4fWIHEf8EMFwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:25.127596 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmgbABkC4fWIHEf8EMGQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:27.585251 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmg6QpVkWug9HeOt9MiAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:28.909288 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:52340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmhFajLEzk2WiQ-10pwgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:30.124282 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:52352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmhlajLEzk2WiQ-10pwwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:32.555917 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:52354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmiKTCbgAP5jq5TehDvQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:36.180898 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmjKTCbgAP5jq5TehDvwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:38.939743 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:52364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmjv9ocpUE4ed4uDwKCgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:40.329407 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:40252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmkFajLEzk2WiQ-10pxAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:43.787436 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:40268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmk1ajLEzk2WiQ-10pyAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:45.137333 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:40276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmlbABkC4fWIHEf8EMHwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:47.698696 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:40284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhml7ABkC4fWIHEf8EMIgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:23:44.113393 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:45934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm0LABkC4fWIHEf8EMYQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:03.646224 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:35098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm41ajLEzk2WiQ-10p6wAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:24:11.457425 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:54236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm6qTCbgAP5jq5TehD1AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:24:14.120916 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:35438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm7qTCbgAP5jq5TehD1gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:24:43.575918 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:35450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnC46lpbStxTqkSkuB1AAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:53.151343 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:49782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnFc_BxrYCr4hPDw8B4gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:54.557855 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:57490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnFtSswJuvopo3lOh2jgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:55.863117 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnF0r9dMAiw-8KANNfowAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:57.263213 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:57504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnGbABkC4fWIHEf8EMfAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:58.516675 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:52680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnGrABkC4fWIHEf8EMfQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:59.835167 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:52694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnG46lpbStxTqkSkuB1wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:01.046245 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:52710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnHVajLEzk2WiQ-10qHwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:06.178998 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:52724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnILysWC90G-1nBrBcLgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:08.031087 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:52738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJKTCbgAP5jq5TehD4AAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:10.402510 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:36136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJaTCbgAP5jq5TehD4QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:11.913838 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:36150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJ6TCbgAP5jq5TehD6AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:13.128267 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:36154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnKaTCbgAP5jq5TehD6QAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:14.444683 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:36170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnKqQpVkWug9HeOt9MtQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:16.086909 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:36184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnK6QpVkWug9HeOt9MtwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:17.472661 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:36196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnLaQpVkWug9HeOt9MugAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:18.754045 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:34952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnLrABkC4fWIHEf8EMhgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:21.234152 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:34962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnMLABkC4fWIHEf8EMhwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:22.639310 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:34972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnMs_BxrYCr4hPDw8B5wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:24.180016 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:34974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnNNSswJuvopo3lOh2lgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:25.554049 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:34986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnNbysWC90G-1nBrBcNQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:27.081406 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:34998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnN0r9dMAiw-8KANNfxwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:28.512748 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:35966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnOLABkC4fWIHEf8EMiQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:29.876169 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:35978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnObABkC4fWIHEf8EMiwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:31.223176 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:35980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnO1ajLEzk2WiQ-10qLQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:32.358707 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:35982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnPLABkC4fWIHEf8EMkQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:33.875684 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:35986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnPbABkC4fWIHEf8EMkgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:35.070516 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:35998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnP7ABkC4fWIHEf8EMlAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:36.431819 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:36002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQEr9dMAiw-8KANNf1QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:37.683578 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQdSswJuvopo3lOh2mwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:39.183381 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:36924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQ7ABkC4fWIHEf8EMmwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:41.570402 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:36934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnRKQpVkWug9HeOt9MwgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:43.173783 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:36948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnR6QpVkWug9HeOt9MxgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:44.553337 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:36956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnSEr9dMAiw-8KANNf4gAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:46.036009 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:36962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnSs_BxrYCr4hPDw8B7gAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:47.278596 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:36966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnS7ysWC90G-1nBrBcOgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:49.338140 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:40884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnTFajLEzk2WiQ-10qNgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:50.769793 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:40888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnTtSswJuvopo3lOh2oAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:52.088370 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:40892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnULysWC90G-1nBrBcPAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:54.453021 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:40900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnUdSswJuvopo3lOh2ogAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:55.955012 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:40914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnU6TCbgAP5jq5TehD-wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:57.195584 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnVc_BxrYCr4hPDw8B8wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:58.586136 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:39344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnVrysWC90G-1nBrBcPQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:00.758081 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnV6QpVkWug9HeOt9MzQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:02.051881 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:39374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnWqQpVkWug9HeOt9MzwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:03.292728 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:39388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnW6TCbgAP5jq5TehEAwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:04.725154 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:39402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnXLABkC4fWIHEf8EMowAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:05.943551 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:39414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnXaTCbgAP5jq5TehEBwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:07.230490 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:39420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnX6QpVkWug9HeOt9M0gAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:08.451473 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:56852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnYI6lpbStxTqkSkuB8AAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:09.867388 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:56860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnYbABkC4fWIHEf8EMpQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:13.364561 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:56866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnZc_BxrYCr4hPDw8CAAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:46.000559 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.228.16:60380] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhnhaTCbgAP5jq5TehEEQAAAsU"]
[Mon Mar 16 17:26:53.737193 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:56874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnjUr9dMAiw-8KANNgaAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:27:43.654529 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:57348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnv_9ocpUE4ed4uDwK4gAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:27:48.430259 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:35544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnxP9ocpUE4ed4uDwK6QAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:10.075462 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:41650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn2rABkC4fWIHEf8EM-QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:12.567111 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:49094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn3FajLEzk2WiQ-10qdwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:24.195443 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:49104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn51ajLEzk2WiQ-10qhQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:26.669827 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:42954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn6rABkC4fWIHEf8EM_wAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:28:30.151109 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:42962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn7kr9dMAiw-8KANNhFAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:33.404334 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:46570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn8aTCbgAP5jq5TehEOgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:39.138702 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:46576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn90r9dMAiw-8KANNhJQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:29:04.220121 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:52422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoEEr9dMAiw-8KANNhVAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:29:11.116360 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:35296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoF7ABkC4fWIHEf8ENFAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:29:13.530194 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:50814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoGdSswJuvopo3lOh29wAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:29:14.843067 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:50816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoGo6lpbStxTqkSkuCIgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:29:17.302553 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:50830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoHbABkC4fWIHEf8ENGAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:29:55.954882 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.244.31:53394] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhoQ_9ocpUE4ed4uDwK_wAAAgY"]
[Mon Mar 16 17:30:36.957314 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:43300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhobM_BxrYCr4hPDw8CkgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:30:38.467946 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:49382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhobtSswJuvopo3lOh3DwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:30:41.835255 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:49396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhocY6lpbStxTqkSkuCRwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:31:46.413416 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.228.16:36942] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhosqQpVkWug9HeOt9NQQAAA0U"]
[Mon Mar 16 17:31:47.520526 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:49406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhos7ABkC4fWIHEf8ENmwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:42.809328 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:44942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho6s_BxrYCr4hPDw8CtwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:32:49.826470 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:35404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho8c_BxrYCr4hPDw8CwgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:52.475505 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:47654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9LABkC4fWIHEf8EN1QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:53.966195 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:47664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9bABkC4fWIHEf8EN1wAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:32:54.728422 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9tSswJuvopo3lOh3WgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:57.319489 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:47672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-dSswJuvopo3lOh3XgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:58.364591 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:49766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-rysWC90G-1nBrBdCgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:59.931991 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:47680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-7ABkC4fWIHEf8EN4AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:09.742624 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpBbABkC4fWIHEf8EN8QAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:33:11.026968 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:43222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpB_9ocpUE4ed4uDwLsQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:12.247914 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:43230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpCP9ocpUE4ed4uDwLtAAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:29.465960 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:51748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpGf9ocpUE4ed4uDwLwgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:41.783979 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:41250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpJc_BxrYCr4hPDw8C2QAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:33:47.296205 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:47790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpK6TCbgAP5jq5TehEogAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:01.326967 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:60576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpOc_BxrYCr4hPDw8C4wAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:03.927866 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:54632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpO_9ocpUE4ed4uDwL1QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:05.239153 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:54642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpPY6lpbStxTqkSkuCgAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:06.445188 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:54656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpPkr9dMAiw-8KANNiCgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:11.117576 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:54668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpQ8_BxrYCr4hPDw8C6QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:22.130188 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:48268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpTo6lpbStxTqkSkuCkgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:23.498870 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:36518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpT6TCbgAP5jq5TehErgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:24.727240 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:36520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpULABkC4fWIHEf8EODwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:26.033346 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:36534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpUrABkC4fWIHEf8EOEQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:27.279093 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:36550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpU8_BxrYCr4hPDw8C8gAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:28.570997 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:46212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVM_BxrYCr4hPDw8C9gAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:29.756066 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:46228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVf9ocpUE4ed4uDwL1wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:30.935186 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVrysWC90G-1nBrBdXQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:32.234354 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:46232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpWI6lpbStxTqkSkuClAAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:34.971509 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:46240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpWrysWC90G-1nBrBdZgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:36.209819 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpXKTCbgAP5jq5TehEsQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:37.379487 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:46258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpXVajLEzk2WiQ-10q-QAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:40.494042 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:38472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpYFajLEzk2WiQ-10q_AAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:41.847599 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:38486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpYVajLEzk2WiQ-10q_QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:44.554191 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:38496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZP9ocpUE4ed4uDwL2gAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:45.910869 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:38510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZbABkC4fWIHEf8EOGAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:47.125927 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:38520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZ46lpbStxTqkSkuClwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:49.528647 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:34650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpaY6lpbStxTqkSkuCmQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:50.687318 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:34652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpakr9dMAiw-8KANNiMAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:51.965013 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:34660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpa9SswJuvopo3lOh3igAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:54.495590 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:34676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpbrABkC4fWIHEf8EOHAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:55.979561 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:60372] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhpb9SswJuvopo3lOh3jAAAAIw"]
[Mon Mar 16 17:35:00.926062 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:34690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpdKTCbgAP5jq5TehEuQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:02.424858 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:50626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpds_BxrYCr4hPDw8DAgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:03.599042 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:50630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpd6QpVkWug9HeOt9NagAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:04.948909 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:50632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpeNSswJuvopo3lOh3kgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:06.189619 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:50640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhperysWC90G-1nBrBdggAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:09.676818 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:50654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpfaQpVkWug9HeOt9NbQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:12.953027 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:36630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpgI6lpbStxTqkSkuCpgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:14.316954 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:36636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpgs_BxrYCr4hPDw8DBwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:17.623726 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:36638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhphc_BxrYCr4hPDw8DCwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:20.051133 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpiKTCbgAP5jq5TehEwgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:31.098497 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:55260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpk6TCbgAP5jq5TehEzgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:32.396700 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:32982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhplP9ocpUE4ed4uDwL4wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:35.784151 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:32996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpl7ABkC4fWIHEf8EOIAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:37.102157 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:32998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpmf9ocpUE4ed4uDwL5gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:38.263112 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:38712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpms_BxrYCr4hPDw8DEwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:39.571703 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:38726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpm1ajLEzk2WiQ-10rCwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:42.874978 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:38734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpnv9ocpUE4ed4uDwL7AAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:44.298389 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:38740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpoM_BxrYCr4hPDw8DFwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:45.481530 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:38742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpoUr9dMAiw-8KANNiWgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:46.749022 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:38750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpov9ocpUE4ed4uDwL7QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:50.742751 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:51658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpps_BxrYCr4hPDw8DHAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:53.511365 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:51662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpqdSswJuvopo3lOh3mgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:35:56.432201 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:60416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhprI6lpbStxTqkSkuC0QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:36:07.342347 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:51666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpt6QpVkWug9HeOt9NkQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:20.625553 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:57340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpxNSswJuvopo3lOh3rAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:22.952613 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:42684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpxrABkC4fWIHEf8EOLwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:33.688408 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp0VajLEzk2WiQ-10rRwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:36.707838 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:43820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp1LABkC4fWIHEf8EONQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:38.005156 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:43830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp1rysWC90G-1nBrBdlQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:40.275118 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp2I6lpbStxTqkSkuC_AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:46.442870 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.228.16:38906] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhp3qTCbgAP5jq5TehE3gAAAtg"]
[Mon Mar 16 17:36:55.203153 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:44636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp51ajLEzk2WiQ-10raQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:01.318652 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:54246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp7f9ocpUE4ed4uDwMBwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:02.708187 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp7rysWC90G-1nBrBdoAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:03.919514 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:54648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp746lpbStxTqkSkuDFQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:05.211720 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:54664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp8aTCbgAP5jq5TehE5AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:06.460981 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:54666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp8qTCbgAP5jq5TehE5gAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:07.754879 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:54678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp81ajLEzk2WiQ-10rdQAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:09.051055 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:38428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp9VajLEzk2WiQ-10reAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:14.654527 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:38434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp-v9ocpUE4ed4uDwMDAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:15.942070 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:38450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp-6QpVkWug9HeOt9NpAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:17.159113 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:38456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_c_BxrYCr4hPDw8DMwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:18.466392 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:55034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_qQpVkWug9HeOt9NpQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:19.663855 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:55036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_6QpVkWug9HeOt9NpgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:20.985668 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:55040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqAM_BxrYCr4hPDw8DNQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:22.534925 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:55052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqArysWC90G-1nBrBdpwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:25.007193 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:55060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqA0r9dMAiw-8KANNicgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:26.347561 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:55068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqBrysWC90G-1nBrBdqQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:27.535434 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqB9SswJuvopo3lOh3wgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:30.959946 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:57844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqCv9ocpUE4ed4uDwMFAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:34.450602 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:57856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqDaTCbgAP5jq5TehE-wAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:36.817788 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:57864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqEI6lpbStxTqkSkuDNQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:38.092328 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:47264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqErABkC4fWIHEf8EOUQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:41.527544 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:47274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqFbABkC4fWIHEf8EOVQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:42.818635 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:47290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqFtSswJuvopo3lOh3ywAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:47.593661 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:36482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqG46lpbStxTqkSkuDQAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:37:49.058106 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:47302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqHf9ocpUE4ed4uDwMHQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:52.655381 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:57226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqIKTCbgAP5jq5TehFAQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:57.258843 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:57230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqJc_BxrYCr4hPDw8DTwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:00.822811 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:48600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqKI6lpbStxTqkSkuDSgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:05.534410 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:48608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqLaTCbgAP5jq5TehFBQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:38:11.390181 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:48622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqM9SswJuvopo3lOh31QAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:12.714485 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:43658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqNNSswJuvopo3lOh31gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:30.930878 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:43660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqRqTCbgAP5jq5TehFHQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:32.252844 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:54546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqSP9ocpUE4ed4uDwMKgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:33.511629 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:54550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqSVajLEzk2WiQ-10rqAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:37.027777 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqTf9ocpUE4ed4uDwMMQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:38.355597 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:56646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqTqQpVkWug9HeOt9NwQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:39.542013 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:56650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqT_9ocpUE4ed4uDwMNAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:40.799280 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:56652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqUP9ocpUE4ed4uDwMNQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:41.935793 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:56666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqUdSswJuvopo3lOh33wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:43.226431 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:56678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqU1ajLEzk2WiQ-10rrQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:44.431084 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:56690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVLABkC4fWIHEf8EObgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:45.759787 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:56702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVbysWC90G-1nBrBdwQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:46.925253 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:56710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVqTCbgAP5jq5TehFHgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:49.300496 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:51692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqWdSswJuvopo3lOh35gAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:50.634746 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:51700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqWkr9dMAiw-8KANNiuQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:51.819106 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:51702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqW6TCbgAP5jq5TehFIQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:53.076096 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:51714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqXbysWC90G-1nBrBdwwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:54.232669 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:51730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqXrysWC90G-1nBrBdxAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:55.551358 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:51732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqX6TCbgAP5jq5TehFIgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:57.466981 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:51742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqYEr9dMAiw-8KANNiwAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:58.799716 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:45458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqYlajLEzk2WiQ-10rsAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:59.996587 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:45468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqY9SswJuvopo3lOh37AAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:01.368417 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZVajLEzk2WiQ-10rsQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:02.551040 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:45486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZqQpVkWug9HeOt9NxwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:03.825517 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:45502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZ7ysWC90G-1nBrBdyQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:08.888363 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:45514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqbI6lpbStxTqkSkuDWwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:18.834053 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:50284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqdo6lpbStxTqkSkuDZgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:39:28.816709 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:39766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqgNSswJuvopo3lOh3-wAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:30.135568 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:59604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqgo6lpbStxTqkSkuDZwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:31.268334 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:59618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqg7ysWC90G-1nBrBdzgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:32.571015 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:59622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhEr9dMAiw-8KANNi3wAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:33.721142 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:59626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhaTCbgAP5jq5TehFKgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:34.971048 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:59640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhqQpVkWug9HeOt9NzAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:36.840541 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:59648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqiLABkC4fWIHEf8EOfAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:37.997945 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:45596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqiVajLEzk2WiQ-10rygAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:39.260888 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:45608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqi1ajLEzk2WiQ-10rzgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:40.591041 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:45622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqjFajLEzk2WiQ-10r0QAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:41.902670 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:45630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqjbABkC4fWIHEf8EOfQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:43.084443 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:45642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqj7ABkC4fWIHEf8EOfgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:44.384576 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:45658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqkLABkC4fWIHEf8EOgAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:45.536647 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:45674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqkc_BxrYCr4hPDw8DrgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:47.868120 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:45676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqks_BxrYCr4hPDw8DsQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:49.230353 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:36998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqldSswJuvopo3lOh4BgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:50.579436 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:37012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqlrysWC90G-1nBrBd0gAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:51.737904 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:37024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhql6QpVkWug9HeOt9N0QAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:52.994239 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:37034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqmKQpVkWug9HeOt9N0gAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:54.240582 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:37038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqmkr9dMAiw-8KANNi8QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:56.218165 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.244.31:33792] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhqnLysWC90G-1nBrBd2QAAAYg"]
[Mon Mar 16 17:39:56.595224 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:37040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqnM_BxrYCr4hPDw8DvQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:57.893546 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:37042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqnaQpVkWug9HeOt9N1AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:59.088028 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:59094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqn8_BxrYCr4hPDw8DvgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:00.351587 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:59106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqoP9ocpUE4ed4uDwMWAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:01.946324 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:59120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqoUr9dMAiw-8KANNi9QAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:03.711068 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:59122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqo0r9dMAiw-8KANNi-AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:04.812466 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:59128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqpKTCbgAP5jq5TehFSAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:06.159813 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:59130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqps_BxrYCr4hPDw8DwgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:07.391585 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:59142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqp6QpVkWug9HeOt9N7AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:09.948336 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:57028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqqKQpVkWug9HeOt9N7gAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:11.268019 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:57030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqq6QpVkWug9HeOt9N8gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:12.448941 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:57036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqrI6lpbStxTqkSkuDbQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:13.690965 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:57052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqrdSswJuvopo3lOh4IAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:15.038963 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:57066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqr6QpVkWug9HeOt9N9QAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:16.196391 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:57080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsM_BxrYCr4hPDw8DwwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:17.494173 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:57096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsbysWC90G-1nBrBd5AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:18.702687 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:46904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsrABkC4fWIHEf8EOngAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:20.059973 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:46920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqtEr9dMAiw-8KANNi_QAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:21.275406 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:46924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqtaTCbgAP5jq5TehFUQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:22.584898 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:46936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqttSswJuvopo3lOh4KQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:23.838861 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:46944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqt0r9dMAiw-8KANNi_gAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:25.189807 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:46954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhquUr9dMAiw-8KANNi_wAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:26.355344 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:46960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqutSswJuvopo3lOh4LgAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:27.658532 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:46970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqu7ABkC4fWIHEf8EOpgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:28.875492 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:43556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqvFajLEzk2WiQ-10r3gAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:30.168299 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:43568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqvrysWC90G-1nBrBd6wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:32.232034 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:43572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqv0r9dMAiw-8KANNjAQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:42.291249 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:43576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqyrysWC90G-1nBrBd-AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:14.289917 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:55408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq6rysWC90G-1nBrBeHAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:41:34.220745 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:41214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq_s_BxrYCr4hPDw8D7wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:35.533852 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:57102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq_6TCbgAP5jq5TehFYwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:39.955289 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:57110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrA7ysWC90G-1nBrBeKwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:46.754736 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:58228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrCtSswJuvopo3lOh4mwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:48.058258 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:38974] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhrDNSswJuvopo3lOh4ngAAAIE"]
[Mon Mar 16 17:41:48.075080 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:58240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDKTCbgAP5jq5TehFZgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:49.247758 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:49078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDf9ocpUE4ed4uDwMkQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:50.541350 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:49082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDv9ocpUE4ed4uDwMkwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:52.963491 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrENSswJuvopo3lOh4rAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:54.255307 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrErABkC4fWIHEf8EO_QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:56.538000 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:49112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrE6QpVkWug9HeOt9OEwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:57.953201 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:49118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrFbABkC4fWIHEf8EPAgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:00.118932 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrGLABkC4fWIHEf8EPCgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:03.526088 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:53216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrGkr9dMAiw-8KANNjIwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:06.095611 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:53224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrHrABkC4fWIHEf8EPEAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:07.477332 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:53238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrH9SswJuvopo3lOh4uQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:10.023084 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:60854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrIrysWC90G-1nBrBeOgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:11.337231 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:60860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrI0r9dMAiw-8KANNjJwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:12.551431 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:60876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJM_BxrYCr4hPDw8D_gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:13.967066 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:60890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJaTCbgAP5jq5TehFcgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:15.206702 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJ7ABkC4fWIHEf8EPGgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:17.602524 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:60910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrKdSswJuvopo3lOh4xQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:19.929229 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:55178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrK6QpVkWug9HeOt9OHAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:21.244471 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:55182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrLbysWC90G-1nBrBeQgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:22.467456 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:55186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrLqTCbgAP5jq5TehFeAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:23.761467 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:55194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrL8_BxrYCr4hPDw8EAAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:24.991434 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:55196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrMLABkC4fWIHEf8EPJgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:26.310731 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:55202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrMo6lpbStxTqkSkuDkQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:27.505792 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:55218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrM7ysWC90G-1nBrBeRwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:28.774459 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:45750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrNI6lpbStxTqkSkuDkwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:34.300687 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:45756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrOrABkC4fWIHEf8EPKwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:42:38.040955 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:45760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrPlajLEzk2WiQ-10sGwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:39.388192 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:41522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrP9SswJuvopo3lOh44gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:40.584161 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:41536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrQLABkC4fWIHEf8EPLAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:59.535044 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:41548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrU0r9dMAiw-8KANNjQwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:43:01.964045 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:57110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrVVajLEzk2WiQ-10sOAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:43:13.208981 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:57112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrYf9ocpUE4ed4uDwMtgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:43:33.540057 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:58312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrdaQpVkWug9HeOt9OOAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:04.412063 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:36144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrlKQpVkWug9HeOt9OWQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:05.980941 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:59332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrlVajLEzk2WiQ-10scgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:18.238167 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:59336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrorysWC90G-1nBrBeaQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:21.664093 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:53052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrpbABkC4fWIHEf8EPTwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:23.013894 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:53062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrp6TCbgAP5jq5TehFlwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:27.601973 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:53078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrq46lpbStxTqkSkuDrQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:29.014409 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:51964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrrY6lpbStxTqkSkuDrgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:33.429070 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:51970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrsaTCbgAP5jq5TehFoAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:35.927152 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:51980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrs9SswJuvopo3lOh5RwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:38.596815 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:52446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrts_BxrYCr4hPDw8EVgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:39.515979 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:51994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrt0r9dMAiw-8KANNjWwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:39.961280 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:40558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrt7ysWC90G-1nBrBebAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:41.145425 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:59874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhruVajLEzk2WiQ-10slAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:43.099808 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:37090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhru1ajLEzk2WiQ-10smgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:44.455468 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:37098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvP9ocpUE4ed4uDwM1gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:45.669499 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:37104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvdSswJuvopo3lOh5TAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:46.971617 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:37120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvrABkC4fWIHEf8EPUAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:49.331607 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:46044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrwbABkC4fWIHEf8EPUwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:54.427885 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:46060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrxrABkC4fWIHEf8EPVwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:56.803083 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.244.31:59834] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhryFajLEzk2WiQ-10srgAAApY"]
[Mon Mar 16 17:44:58.007471 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:46068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrytSswJuvopo3lOh5VAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:59.844851 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:48550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhry46lpbStxTqkSkuDuwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:01.237191 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:48560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrzaTCbgAP5jq5TehFqAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:06.799819 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:48564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr0tSswJuvopo3lOh5WwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:08.146612 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:39232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr1LABkC4fWIHEf8EPXQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:14.587466 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:39242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr2o6lpbStxTqkSkuDxgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:16.714519 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr29SswJuvopo3lOh5YgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:20.407448 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:49154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr4KTCbgAP5jq5TehFtAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:21.710973 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:49164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr4Ur9dMAiw-8KANNjawAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:23.916152 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:49180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr47ABkC4fWIHEf8EPYwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:29.930559 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:49190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr6Ur9dMAiw-8KANNjbwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:32.309114 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:41058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr7KQpVkWug9HeOt9OZwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:33.602964 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:41066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr7bABkC4fWIHEf8EPZQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:40.398347 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:59880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9LysWC90G-1nBrBeqgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:40.412305 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:41076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9LABkC4fWIHEf8EPawAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:42.827115 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:34342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9lajLEzk2WiQ-10s0wAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:45.255278 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:34350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr-f9ocpUE4ed4uDwM7wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:46.598983 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:34354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr-qQpVkWug9HeOt9OaQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:48.855768 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:34362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr_P9ocpUE4ed4uDwM8QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:51.767507 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:42096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr_7ysWC90G-1nBrBetwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:45:54.948574 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:33122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsArABkC4fWIHEf8EPcAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:57.425698 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:33128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsBbABkC4fWIHEf8EPcwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:59.010495 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:37130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsB9SswJuvopo3lOh5dAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:03.295060 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:37406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsCaTCbgAP5jq5TehFxgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:03.296071 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:37146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsClajLEzk2WiQ-10s5wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:05.765982 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:37150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsDaQpVkWug9HeOt9ObQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:07.098175 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:37164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsD7ABkC4fWIHEf8EPdwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:07.962752 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:60300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsD6TCbgAP5jq5TehFygAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:08.287115 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:38346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsELABkC4fWIHEf8EPegAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:14.039087 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:38350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsFrABkC4fWIHEf8EPigAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:18.919938 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:38352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsGkr9dMAiw-8KANNjgAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:20.339268 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:39726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsHKQpVkWug9HeOt9OcAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:23.887050 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:39736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsH9SswJuvopo3lOh5eQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:48.210128 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:47602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhsONSswJuvopo3lOh5fwAAAIE"]
[Mon Mar 16 17:47:00.232286 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:39742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsRLABkC4fWIHEf8EP6gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:47:03.866455 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:59976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsR7ABkC4fWIHEf8EP8wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:47:19.710628 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:60310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsV7ABkC4fWIHEf8EQEwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:15.110477 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:50926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsj7ysWC90G-1nBrBfNQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:24.285020 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:59986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsmLysWC90G-1nBrBfQAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:48:25.577943 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:56884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsmf9ocpUE4ed4uDwNBwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:35.876358 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:56894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhso9SswJuvopo3lOh5mgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:45.040972 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:42640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsrbABkC4fWIHEf8EQegAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:48.479627 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:40444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhssEr9dMAiw-8KANNjiQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:59.963016 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:37984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsu_9ocpUE4ed4uDwNIwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:49:10.184902 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:51316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsxkr9dMAiw-8KANNjkgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:49:13.683255 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:51428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsydSswJuvopo3lOh5tAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:49:16.158810 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:51432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhszLysWC90G-1nBrBfRgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:50:06.708106 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:51434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhs_s_BxrYCr4hPDw8ElgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:50:12.178507 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:55610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtBLysWC90G-1nBrBfUwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:50:18.687145 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtCrysWC90G-1nBrBfWgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:25.297945 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:43502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtEaTCbgAP5jq5TehF7gAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:39.454457 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:43504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtH7ABkC4fWIHEf8EQtwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:47.298471 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:34336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtJ7ABkC4fWIHEf8EQvQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:51:10.261580 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:40910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtPrABkC4fWIHEf8EQ1gAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:51:17.921268 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:41086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtRdSswJuvopo3lOh6QAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:51:49.263257 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.228.16:34960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhtZf9ocpUE4ed4uDwNmAAAAhQ"]
[Mon Mar 16 17:52:24.719837 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:56412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtiM_BxrYCr4hPDw8FNQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:52:35.095481 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtk9SswJuvopo3lOh6lAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:53:02.314120 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtro6lpbStxTqkSkuEIgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:53:32.183453 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:37870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtzP9ocpUE4ed4uDwN9wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:53:35.607804 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:60334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtz46lpbStxTqkSkuEKwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:53:40.659008 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:60336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht1KTCbgAP5jq5TehGLAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:53:46.034998 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:55326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht2rysWC90G-1nBrBfoQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:02.173438 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:36340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht6s_BxrYCr4hPDw8FoAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:03.533770 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:34876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht67ysWC90G-1nBrBfowAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:24.242947 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:34890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuAKTCbgAP5jq5TehGTgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:25.582742 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:47034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuAaQpVkWug9HeOt9OwgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:37.021489 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:47042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuDaTCbgAP5jq5TehGXQAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:38.350027 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:33524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuDtSswJuvopo3lOh6pgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:54:49.373488 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:33534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuGbysWC90G-1nBrBfsQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:58.007570 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:42438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuIrysWC90G-1nBrBfuQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:58.342743 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.244.31:44482] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhuIv9ocpUE4ed4uDwOawAAAgE"]
[Mon Mar 16 17:55:01.449397 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:34518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuJc_BxrYCr4hPDw8FrgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:06.270937 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:34528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuKo6lpbStxTqkSkuENQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:55:13.465585 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:34530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuMaQpVkWug9HeOt9OzAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:25.028039 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuPbABkC4fWIHEf8ERYwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:55:26.433191 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:44966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuPrABkC4fWIHEf8ERZQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:55:27.595608 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:44980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuP6TCbgAP5jq5TehGZwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:29.696143 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:51830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuQbABkC4fWIHEf8ERaQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 17:55:30.047891 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:48760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuQs_BxrYCr4hPDw8FsgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:55:44.598561 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:38100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuUKQpVkWug9HeOt9O4QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 17:56:36.270367 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:39782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuhLABkC4fWIHEf8ERmAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:56:42.729859 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:48772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuilajLEzk2WiQ-10twgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:56:50.823917 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.228.16:45096] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhukv9ocpUE4ed4uDwOrwAAAhA"]
[Mon Mar 16 17:57:03.832277 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:44804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhun8_BxrYCr4hPDw8FzgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:20.480160 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:52014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhusFajLEzk2WiQ-10t0QAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:36.710977 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:49430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuwLABkC4fWIHEf8ERtAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:37.991608 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:54402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuwdSswJuvopo3lOh7DAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:39.151306 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:49424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuw7ABkC4fWIHEf8ERtgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:43.484502 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhux7ABkC4fWIHEf8ERuQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:43.817378 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:43960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhux46lpbStxTqkSkuEgwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:47.390764 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:49442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuy46lpbStxTqkSkuEhQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:48.702423 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:59316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuzKQpVkWug9HeOt9O8QAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:51.860224 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:59324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuz6TCbgAP5jq5TehGeQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:55.295818 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:59338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu046lpbStxTqkSkuEiAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:58.603281 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:59348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu1qTCbgAP5jq5TehGfQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:02.028598 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:45894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu2rABkC4fWIHEf8ERzAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:03.419272 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:45900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu20r9dMAiw-8KANNj4gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:04.504909 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:45914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3KTCbgAP5jq5TehGfgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:05.778676 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:56934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3bABkC4fWIHEf8ER0AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:58:05.867455 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:45918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3f9ocpUE4ed4uDwOuAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:07.058845 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:45934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu36TCbgAP5jq5TehGfwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:08.247566 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:47908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4M_BxrYCr4hPDw8F0wAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:09.559800 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:47918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4aTCbgAP5jq5TehGggAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:10.765800 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:47934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4o6lpbStxTqkSkuEiwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:12.041219 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:47940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5P9ocpUE4ed4uDwOuQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:13.258014 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:47952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5f9ocpUE4ed4uDwOugAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:14.595461 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:47958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5qQpVkWug9HeOt9O9wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:15.779459 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:47966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5_9ocpUE4ed4uDwOvAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:15.816611 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:46950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu57ysWC90G-1nBrBf4wAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:17.100956 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:47976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu6VajLEzk2WiQ-10t2AAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:18.319205 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:43896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu6qTCbgAP5jq5TehGjwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:20.034939 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:43912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu646lpbStxTqkSkuEjgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:21.255145 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:43918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu7Ur9dMAiw-8KANNj8AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:22.564662 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:43920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu7tSswJuvopo3lOh7JgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:23.773953 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:43928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu76QpVkWug9HeOt9O-AAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:27.490738 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:43930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu8bysWC90G-1nBrBf5wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:28.763520 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:39590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu9I6lpbStxTqkSkuEjwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:29.869683 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:39592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu9c_BxrYCr4hPDw8F1gAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:37.633989 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:39594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu_aQpVkWug9HeOt9PAwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:58:45.487359 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:53508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvBbABkC4fWIHEf8ER2gAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:58:50.331106 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:53516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvCrABkC4fWIHEf8ER4AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:05.407574 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:35100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvGaTCbgAP5jq5TehG3AAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:05.751236 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:43958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvGf9ocpUE4ed4uDwO1AAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:08.218506 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:32922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvHLysWC90G-1nBrBf-wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:12.980830 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:40752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvIM_BxrYCr4hPDw8F5gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:14.294906 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:40754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvIqTCbgAP5jq5TehG7AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:59:23.958859 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:40760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvK46lpbStxTqkSkuEqAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:29.597095 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:35994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvMaQpVkWug9HeOt9PDQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:36.280022 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvOP9ocpUE4ed4uDwO2gAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:42.951619 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:50218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvPkr9dMAiw-8KANNkFwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:58.430797 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.244.31:58954] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhvTlajLEzk2WiQ-10t5gAAApI"]
[Mon Mar 16 17:59:58.819548 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvTkr9dMAiw-8KANNkJQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:01.439596 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:58052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvUf9ocpUE4ed4uDwO3QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:06.155454 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:58054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvVlajLEzk2WiQ-10t6wAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:08.599239 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:58056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvWKQpVkWug9HeOt9PEwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:00:14.995684 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:56142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvXqTCbgAP5jq5TehHVwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:21.592571 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvZVajLEzk2WiQ-10t_AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:08.009040 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:37208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlFajLEzk2WiQ-10uKQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:09.598588 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:51872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlVajLEzk2WiQ-10uKwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:10.930213 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:33618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlqTCbgAP5jq5TehHaQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:12.183238 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:33624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmLysWC90G-1nBrBgEQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:13.420297 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:33636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmaTCbgAP5jq5TehHagAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:14.752475 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmqTCbgAP5jq5TehHbAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:15.919733 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:33644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvm7ysWC90G-1nBrBgEgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:17.299028 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:33658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvnbysWC90G-1nBrBgEwAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:19.185443 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:33674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvntSswJuvopo3lOh7UgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:20.726894 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:36632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvoKTCbgAP5jq5TehHbQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:21.861916 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:36648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvodSswJuvopo3lOh7UwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:23.155131 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:36660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvo_9ocpUE4ed4uDwPDQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:24.333611 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:36668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvpLABkC4fWIHEf8ER_AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:25.620775 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:36678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvpY6lpbStxTqkSkuEugAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:26.826409 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:36686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvprysWC90G-1nBrBgFQAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:27.999001 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:36690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvp8_BxrYCr4hPDw8F9QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:29.179263 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.243.203:36702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvqc_BxrYCr4hPDw8F9gAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:30.514079 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:59542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvqqTCbgAP5jq5TehHbwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:31.728636 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:59554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvq6TCbgAP5jq5TehHcAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:33.057593 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvrbABkC4fWIHEf8ESAAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:34.230378 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:59568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvrtSswJuvopo3lOh7VAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:35.576211 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:59574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvr7ysWC90G-1nBrBgFgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:36.759696 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:59590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvsM_BxrYCr4hPDw8F9wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:38.031603 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:59598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvsqQpVkWug9HeOt9PXQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:39.301597 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:59604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvs7ABkC4fWIHEf8ESAQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:40.457302 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:49596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvtLABkC4fWIHEf8ESAgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:42.797805 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:49600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvtrABkC4fWIHEf8ESBgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:44.087927 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:49610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvuLABkC4fWIHEf8ESBwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:45.257072 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:49620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvuUr9dMAiw-8KANNkNgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:46.559271 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:49630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvutSswJuvopo3lOh7VQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:47.715921 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:49632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvu7ysWC90G-1nBrBgFwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:49.024209 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:49646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvvaTCbgAP5jq5TehHcQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:50.224402 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:45394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvvrABkC4fWIHEf8ESCAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:50.852353 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:49378] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhvvrABkC4fWIHEf8ESCQAAAEk"]
[Mon Mar 16 18:01:51.531548 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:45400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvv46lpbStxTqkSkuEvQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:52.808306 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.243.203:45404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvwM_BxrYCr4hPDw8F-AAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:00.284675 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:45406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvyLABkC4fWIHEf8ESEQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:01.580340 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:57236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvyf9ocpUE4ed4uDwPLQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:03.317976 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:57248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvy8_BxrYCr4hPDw8F-wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:04.434910 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.243.203:57258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzEr9dMAiw-8KANNkOAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:05.767002 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:57264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzbysWC90G-1nBrBgGQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:06.929569 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:57280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzo6lpbStxTqkSkuEvwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:17.174959 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:57290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv2bysWC90G-1nBrBgIQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:18.505088 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv2qTCbgAP5jq5TehHdAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:19.677153 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:57668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv26QpVkWug9HeOt9PhgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:20.954491 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:46564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv3FajLEzk2WiQ-10uMgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:22.164573 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:46574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv3kr9dMAiw-8KANNkOwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:23.347010 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:46580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv36TCbgAP5jq5TehHdgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:24.688629 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:46588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv4Er9dMAiw-8KANNkPQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:26.532549 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:46602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv4qTCbgAP5jq5TehHdwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:27.860074 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:46614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv446lpbStxTqkSkuEwAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:29.231579 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:46620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv5aTCbgAP5jq5TehHeAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:30.378758 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:43506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv5kr9dMAiw-8KANNkPgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:31.633096 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:43516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv58_BxrYCr4hPDw8F_gAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:46.255339 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:45410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv9tSswJuvopo3lOh7cAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:02:58.685355 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:52916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwAqTCbgAP5jq5TehHiAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:03:10.317173 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:53282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwDo6lpbStxTqkSkuE0AAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:20.303007 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwGEr9dMAiw-8KANNkeAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:23.744384 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:57432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwG46lpbStxTqkSkuE1wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:27.439548 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:57438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwH46lpbStxTqkSkuE2wAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:44.007693 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:47084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwMLysWC90G-1nBrBgZwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:03:49.151561 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:50244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwNaTCbgAP5jq5TehHlQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:03:54.114498 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:50180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwOLABkC4fWIHEf8ESIgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:04:22.870942 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:50196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwVkr9dMAiw-8KANNk0gAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:57.633129 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:39016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwebysWC90G-1nBrBgwAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:58.915912 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:51950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhweqQpVkWug9HeOt9PlQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:59.138883 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:49678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhwe46lpbStxTqkSkuE6QAAAkw"]
[Mon Mar 16 18:05:04.135430 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:51958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwgKTCbgAP5jq5TehHowAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:22.590052 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:51970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwkrABkC4fWIHEf8EScQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:27.122906 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:50274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwl9SswJuvopo3lOh7nAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:52.160309 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:56452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwr9SswJuvopo3lOh7xwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:06:49.931564 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:55852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw6dSswJuvopo3lOh8PwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:06:51.220898 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.228.16:57068] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhw66TCbgAP5jq5TehHrwAAAsk"]
[Mon Mar 16 18:06:56.848970 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:35586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw8I6lpbStxTqkSkuE-wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:06:58.188457 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:54376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw8s_BxrYCr4hPDw8GJwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:06:59.362814 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:54382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw87ysWC90G-1nBrBg1QAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:00.765792 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:54386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw9KQpVkWug9HeOt9PpgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:01.939184 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw9bysWC90G-1nBrBg1wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:03.272813 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:54404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw90r9dMAiw-8KANNk5wAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:04.458490 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:54412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-LABkC4fWIHEf8ES8AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:05.831423 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:54414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-c_BxrYCr4hPDw8GKAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:06.980775 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:54430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-s_BxrYCr4hPDw8GKQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:08.346140 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:59896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_Er9dMAiw-8KANNk6QAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:09.518205 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:59908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_bysWC90G-1nBrBg2AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:10.779018 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:59914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_kr9dMAiw-8KANNk6gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:11.998210 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:59924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_8_BxrYCr4hPDw8GLAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:14.461256 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:59928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxAaQpVkWug9HeOt9PpwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:15.789609 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:59942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxA1ajLEzk2WiQ-10uZAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:16.963237 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:59956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxBLABkC4fWIHEf8ETAwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:18.253667 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:42550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxBlajLEzk2WiQ-10uZwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:19.418850 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:42556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxB9SswJuvopo3lOh8WAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:20.713609 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:42570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxCI6lpbStxTqkSkuE_gAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:21.948643 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:42580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxCaQpVkWug9HeOt9PqAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:23.240622 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxC_9ocpUE4ed4uDwPaAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:24.402342 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:42584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDFajLEzk2WiQ-10uaAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:25.706160 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:42594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDVajLEzk2WiQ-10uawAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:26.835304 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:42608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDkr9dMAiw-8KANNk7AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:28.206195 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:60356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEKTCbgAP5jq5TehHtQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:29.480316 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:60372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEc_BxrYCr4hPDw8GLgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:30.772176 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:60378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEo6lpbStxTqkSkuFAAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:31.894405 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:60384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxE9SswJuvopo3lOh8WgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:34.166108 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:60388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxFv9ocpUE4ed4uDwPagAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:35.469483 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:60400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxF46lpbStxTqkSkuFAQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:37.878488 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:60416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxGaQpVkWug9HeOt9PrAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:40.215553 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:52026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxHKTCbgAP5jq5TehHuQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:46.019643 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:52040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxIrABkC4fWIHEf8ETQwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:48.439369 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:52044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxJNSswJuvopo3lOh8XgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:51.995594 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:56570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxJ6QpVkWug9HeOt9PsAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:55.680423 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:56586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxK9SswJuvopo3lOh8YQAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:11.859814 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:35412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxO1ajLEzk2WiQ-10ufQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:08:48.467154 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:55610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxYM_BxrYCr4hPDw8GWQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:48.542240 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:44822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxYKTCbgAP5jq5TehHygAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:53.904930 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:49348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxZUr9dMAiw-8KANNk_AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:53.905232 2026] [mime_magic:error] [pid 29507:tid 140411540502272] (70014)End of file found: [client 74.7.243.203:49348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:02.542491 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:50254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxbqQpVkWug9HeOt9PzwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:09:09.249476 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:43206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxdaTCbgAP5jq5TehH1AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:10.600366 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:53576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxdrABkC4fWIHEf8ETyQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:11.786143 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:53592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxd0r9dMAiw-8KANNlAAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:13.128239 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:53606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxedSswJuvopo3lOh8bgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:14.342990 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:53614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxetSswJuvopo3lOh8cAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:15.657062 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:53624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxe9SswJuvopo3lOh8cQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:17.022806 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:53636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxfbysWC90G-1nBrBg7AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:21.405901 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:37488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxgf9ocpUE4ed4uDwPgwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:23.779097 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:37496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxg46lpbStxTqkSkuFCwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:25.108069 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:37512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxhVajLEzk2WiQ-10uiAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:27.351628 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:37522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxh46lpbStxTqkSkuFDwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:29.736107 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:53892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxibABkC4fWIHEf8ET0AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:32.207236 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:53896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxjLysWC90G-1nBrBg8AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:33.512829 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxjaTCbgAP5jq5TehH1QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:40.568807 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:53910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxlM_BxrYCr4hPDw8GZwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:45.100797 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:41246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxmVajLEzk2WiQ-10ukAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:46.364743 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxmv9ocpUE4ed4uDwPiAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:47.600806 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxm7ysWC90G-1nBrBg8wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:52.358365 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:52590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxn7ysWC90G-1nBrBg9gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:53.705037 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxoUr9dMAiw-8KANNlCQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:59.022498 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:49246] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhxp7ABkC4fWIHEf8ET1AAAAFg"]
[Mon Mar 16 18:10:06.507372 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:52596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxrrysWC90G-1nBrBhAwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:08.662931 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:41856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxr6TCbgAP5jq5TehH2QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:09.953409 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:46358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxsf9ocpUE4ed4uDwPkwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:13.287566 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:46374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxtY6lpbStxTqkSkuFFgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:14.582914 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:46390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxtkr9dMAiw-8KANNlCwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:15.750261 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:46394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxt9SswJuvopo3lOh8qAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:20.472688 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:46404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxvP9ocpUE4ed4uDwPmgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:21.762691 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:43612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxvf9ocpUE4ed4uDwPnQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:23.665215 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:49596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxv6QpVkWug9HeOt9QHQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:28.000643 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:43620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxw1ajLEzk2WiQ-10umAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:30.223329 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:57406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxxtSswJuvopo3lOh8uQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:35.715522 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:47010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxy7ysWC90G-1nBrBhDgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:42.801819 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:47026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx0lajLEzk2WiQ-10uoAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:50.775297 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:44402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx2tSswJuvopo3lOh82gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:55.402900 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:56442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx30r9dMAiw-8KANNlKQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:01.022591 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx5bysWC90G-1nBrBhFAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:02.329507 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:46636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx5s_BxrYCr4hPDw8GewAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:03.543053 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:46638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx57ABkC4fWIHEf8ET4gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:06.100205 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:49516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx6kr9dMAiw-8KANNlNAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:07.067516 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:46654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx6_9ocpUE4ed4uDwPpgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:08.358468 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:45706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx7P9ocpUE4ed4uDwPqQAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:11.731751 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:45712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx77ABkC4fWIHEf8ET6QAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:20.928144 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:45716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx-LABkC4fWIHEf8ET8QAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:30.856341 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:51096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyAo6lpbStxTqkSkuFLwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:32.213251 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:34048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBKQpVkWug9HeOt9QIAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:33.338179 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:34054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBc_BxrYCr4hPDw8GgwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:34.596305 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:34056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBrABkC4fWIHEf8ET9AAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:35.769633 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:34072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyB6QpVkWug9HeOt9QIQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:38.459732 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:34080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyCbABkC4fWIHEf8ET9gAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:39.747709 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:35306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyC9SswJuvopo3lOh9BgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:40.935471 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDEr9dMAiw-8KANNlNgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:41.167120 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:35316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDUr9dMAiw-8KANNlNwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:42.490945 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:35330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDrysWC90G-1nBrBhHgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:44.955412 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:35336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyEP9ocpUE4ed4uDwP3QAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:46.255000 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:35352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyEqQpVkWug9HeOt9QJAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:47.396039 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:35362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyE7ysWC90G-1nBrBhIQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:48.711632 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:55688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyFP9ocpUE4ed4uDwP4gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:49.880428 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:55702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyFf9ocpUE4ed4uDwP5QAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:51.226363 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:55710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyF46lpbStxTqkSkuFRgAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:51.227199 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.228.16:33156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhyF6TCbgAP5jq5TehH7wAAAsc"]
[Mon Mar 16 18:11:52.410437 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyGNSswJuvopo3lOh9CAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:54.668930 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:55722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyGc_BxrYCr4hPDw8GhwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:57.071022 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:55724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyHVajLEzk2WiQ-10urAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:59.463616 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:43938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyH9SswJuvopo3lOh9DAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:00.784511 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:43950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyIM_BxrYCr4hPDw8GiAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:01.931352 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:43966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyIVajLEzk2WiQ-10urgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:03.205219 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:43978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyI9SswJuvopo3lOh9DQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:04.413078 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:43980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJI6lpbStxTqkSkuFUAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:05.603597 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJY6lpbStxTqkSkuFUgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:06.932777 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:44010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJqQpVkWug9HeOt9QKQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:08.083080 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:56836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKM_BxrYCr4hPDw8GjAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:09.481677 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:56844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKaTCbgAP5jq5TehH8QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:10.735663 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:56848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKrABkC4fWIHEf8ET_wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:12.026176 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:56850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLLysWC90G-1nBrBhJwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:13.219189 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:56854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLc_BxrYCr4hPDw8GkgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:14.605066 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:56866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLrABkC4fWIHEf8EUAwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:15.804385 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:56882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyL7ABkC4fWIHEf8EUBgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:19.420030 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:56886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyM8_BxrYCr4hPDw8GlQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:20.806314 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:51418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNKTCbgAP5jq5TehH9AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:22.039810 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:51430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNqTCbgAP5jq5TehH9QAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:22.800158 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:45552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNv9ocpUE4ed4uDwQBQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:23.348866 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:51438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyN7ysWC90G-1nBrBhKAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:25.130950 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.243.203:40846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOUr9dMAiw-8KANNlQAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:26.427485 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:40862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOkr9dMAiw-8KANNlQQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:26.839249 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:51450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOlajLEzk2WiQ-10usgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:28.135204 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:40422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyPNSswJuvopo3lOh9FAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:31.575256 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:40428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyP_9ocpUE4ed4uDwQDAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:32.911489 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:40442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyQLABkC4fWIHEf8EUEQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:36.272059 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:40450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyRP9ocpUE4ed4uDwQEwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:45.515252 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:40464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyTUr9dMAiw-8KANNlUQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:46.801446 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:60700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyTrABkC4fWIHEf8EUEgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:47.987460 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:57874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyT0r9dMAiw-8KANNlUgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:50.448573 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:57888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyUlajLEzk2WiQ-10utgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:02.539194 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:57900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyXv9ocpUE4ed4uDwQOwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:04.890997 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:47856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyYKTCbgAP5jq5TehH_QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:06.132605 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:47866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyYrABkC4fWIHEf8EUGAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:07.306434 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:47870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyY6TCbgAP5jq5TehH_gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:09.675462 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyZaTCbgAP5jq5TehIAAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:10.951233 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:33392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyZkr9dMAiw-8KANNlWAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:12.160220 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:33404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyaNSswJuvopo3lOh9IQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:13.332582 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyaf9ocpUE4ed4uDwQRgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:15.500271 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhya1ajLEzk2WiQ-10uvwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:16.884080 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:33428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhybEr9dMAiw-8KANNlXQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:18.116467 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:46652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhybqQpVkWug9HeOt9QPQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:26.136709 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:46660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhydtSswJuvopo3lOh9LgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:14:26.775446 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyso6lpbStxTqkSkuF3QAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:28.089696 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:39222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhytLysWC90G-1nBrBhRgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:30.407332 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:39226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyttSswJuvopo3lOh9WwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:58.612293 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:51170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy0s_BxrYCr4hPDw8HEAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:14:59.972342 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.244.31:57948] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhy07ysWC90G-1nBrBhSQAAAYg"]
[Mon Mar 16 18:15:06.839447 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:39242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy2tSswJuvopo3lOh9jAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:08.166597 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:56582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy3I6lpbStxTqkSkuF4QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:09.057035 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:49292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy3dSswJuvopo3lOh9jwAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:13.719587 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:51900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy4bysWC90G-1nBrBhUwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:14.915977 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:56588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy4rysWC90G-1nBrBhVAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:15:24.121135 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:56604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7I6lpbStxTqkSkuF6wAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:25.511546 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:37072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7Ur9dMAiw-8KANNlfAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:26.703260 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:37082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7v9ocpUE4ed4uDwQaAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:28.011763 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:37092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8Er9dMAiw-8KANNlfQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:29.216088 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:42116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8Ur9dMAiw-8KANNlfwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:30.509490 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:42118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8o6lpbStxTqkSkuF7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:36.192589 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:42124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-KTCbgAP5jq5TehIIwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:37.657501 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:42132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-dSswJuvopo3lOh9kQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:38.828824 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:53548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-kr9dMAiw-8KANNlggAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:41.267576 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:53558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy_aQpVkWug9HeOt9QaQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:44.987196 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:53574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzAP9ocpUE4ed4uDwQcQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:47.447785 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:53576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzA8_BxrYCr4hPDw8HFgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:48.813033 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:47360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzBP9ocpUE4ed4uDwQdAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:51.067476 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:47374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzB6TCbgAP5jq5TehILAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:52.396934 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:47390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzCLysWC90G-1nBrBhXgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:53.695909 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:47400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzCY6lpbStxTqkSkuF8AAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:54.461607 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzClajLEzk2WiQ-10u_gAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:55.007139 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:47416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzC6QpVkWug9HeOt9QbwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:55.770827 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:40766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzC6QpVkWug9HeOt9QcAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:58.476493 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:47420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzDo6lpbStxTqkSkuF8wAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:59.215351 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:40782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzD_9ocpUE4ed4uDwQfgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:15:59.811139 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:39670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzD1ajLEzk2WiQ-10u_wAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:02.423826 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzEtSswJuvopo3lOh9mwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:04.819860 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:39692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzFFajLEzk2WiQ-10vCQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:06.147385 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:39698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzFtSswJuvopo3lOh9ngAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:08.480096 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:39700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzGKTCbgAP5jq5TehIPQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:09.836656 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:54644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzGaQpVkWug9HeOt9QcQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:11.087369 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:54646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzG0r9dMAiw-8KANNlkgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:12.403516 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:54658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHI6lpbStxTqkSkuF9gAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:13.606880 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHbABkC4fWIHEf8EUxgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:14.891314 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHrysWC90G-1nBrBhZQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:17.065308 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzIc_BxrYCr4hPDw8HIAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:18.343387 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:57770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzIqTCbgAP5jq5TehIQwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:25.380157 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:57784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzKLysWC90G-1nBrBhbAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:27.763407 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:57788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzK_9ocpUE4ed4uDwQhAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:29.034233 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:45342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzLaQpVkWug9HeOt9QcwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:30.251835 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:45350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzLrysWC90G-1nBrBhbgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:31.581696 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:45362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzL8_BxrYCr4hPDw8HJQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:33.831758 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:45378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzMdSswJuvopo3lOh9pAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:35.137685 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:45382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzM9SswJuvopo3lOh9pQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:36.354558 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzNNSswJuvopo3lOh9pgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:37.823936 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:45408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzNf9ocpUE4ed4uDwQiAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:46.809837 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:54038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzPv9ocpUE4ed4uDwQkwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:17:27.211116 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:34906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzZ6TCbgAP5jq5TehIdAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:28.554866 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:36016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzaKQpVkWug9HeOt9QfwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:29.735246 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:36030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzaf9ocpUE4ed4uDwQmAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:30.939682 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzalajLEzk2WiQ-10vZQAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:32.258758 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:36050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbM_BxrYCr4hPDw8HNAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:33.464720 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:36062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbdSswJuvopo3lOh9uQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:34.769700 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:36078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbrABkC4fWIHEf8EU2wAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:38.087179 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:36090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzcv9ocpUE4ed4uDwQnAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:39.419531 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:49906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzc0r9dMAiw-8KANNl3wAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:40.588505 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:49920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzdLABkC4fWIHEf8EU3QAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:41.883053 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:49922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzdaTCbgAP5jq5TehIdgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:43.028120 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:49930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzd9SswJuvopo3lOh9wAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:44.428473 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:49946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzeM_BxrYCr4hPDw8HNwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:45.567486 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:49962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzef9ocpUE4ed4uDwQnQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:46.903194 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:49966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzetSswJuvopo3lOh9wQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:48.124132 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:49492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfKQpVkWug9HeOt9QgQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:49.353926 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:49494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfY6lpbStxTqkSkuGDQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:50.685814 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:49496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfv9ocpUE4ed4uDwQnwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:52.007791 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:49508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzgI6lpbStxTqkSkuGDgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:53.901660 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:49524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzgaQpVkWug9HeOt9QhAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:55.063469 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:58418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzg8_BxrYCr4hPDw8HOwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:55.272520 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:49538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzg9SswJuvopo3lOh9wgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:56.431275 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:49540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhLABkC4fWIHEf8EU4gAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:57.748842 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:49552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhaQpVkWug9HeOt9QhQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:58.938371 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:53934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhrysWC90G-1nBrBhiAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:00.300385 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:53940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhziKQpVkWug9HeOt9QhgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:01.520403 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:53944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhziVajLEzk2WiQ-10vfwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:02.906029 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:53954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzirysWC90G-1nBrBhiQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:04.111284 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:53970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjNSswJuvopo3lOh9yAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:05.489153 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:53986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjY6lpbStxTqkSkuGFQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:06.723273 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:54000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjqQpVkWug9HeOt9QiQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:08.087497 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:54012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkLysWC90G-1nBrBhjQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:09.303638 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:50156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkVajLEzk2WiQ-10vhQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:10.628360 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:50162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkv9ocpUE4ed4uDwQpgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:11.783621 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:50178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzk_9ocpUE4ed4uDwQqAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:13.145641 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzlbysWC90G-1nBrBhjgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:14.313903 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:50186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzlkr9dMAiw-8KANNl9wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:15.709429 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:50190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzl0r9dMAiw-8KANNl-gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:17.463321 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzmaQpVkWug9HeOt9QjwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:20.011675 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:52270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzmlajLEzk2WiQ-10vjQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:22.431253 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:52282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhznqQpVkWug9HeOt9QlAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:23.782399 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:52298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzn46lpbStxTqkSkuGGAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:27.088757 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:52314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzo1ajLEzk2WiQ-10vlwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:28.403197 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:36440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpI6lpbStxTqkSkuGGQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:29.589074 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:36452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpc_BxrYCr4hPDw8HWgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:30.901118 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:36462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpqTCbgAP5jq5TehIgwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:30.947808 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:58434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzps_BxrYCr4hPDw8HXQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:18:32.127036 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:36476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqLysWC90G-1nBrBhkwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:32.331415 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqLysWC90G-1nBrBhlAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:33.452900 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:36478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqaTCbgAP5jq5TehIiQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:36.749696 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:36486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzrNSswJuvopo3lOh90AAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:37.954150 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:36488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzrdSswJuvopo3lOh90QAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:39.132808 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:49170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzr7ysWC90G-1nBrBhlQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:47.091269 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:34056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzt6TCbgAP5jq5TehIlgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:47.402222 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:49176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzt9SswJuvopo3lOh92QAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:39.580156 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:60858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz66TCbgAP5jq5TehI0AAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:54.858195 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:60908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz-qQpVkWug9HeOt9Q2wAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:56.200175 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:50022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz_NSswJuvopo3lOh97wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:00.888860 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.244.31:45432] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh0ALysWC90G-1nBrBhrgAAAY8"]
[Mon Mar 16 18:20:07.223382 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:50036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0B_9ocpUE4ed4uDwQ6gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:28.136007 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:43564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0HI6lpbStxTqkSkuGRgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:30.589142 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:55872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0Ho6lpbStxTqkSkuGSgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:36.075006 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:43574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0JM_BxrYCr4hPDw8HfQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:51.395752 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:57060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0M_9ocpUE4ed4uDwRGQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:52.764629 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0NP9ocpUE4ed4uDwRGgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:21:46.267384 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:43580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0arABkC4fWIHEf8EVhgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:21:46.987478 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:36030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0aqTCbgAP5jq5TehJTAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:48.431108 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:50514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0bM_BxrYCr4hPDw8HjQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:21:49.603490 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:50524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0bdSswJuvopo3lOh-GwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:51.914925 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:50534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0b6TCbgAP5jq5TehJUQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:21:53.475315 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:57238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0cVajLEzk2WiQ-10wHAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:56.823130 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:50538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0dLysWC90G-1nBrBhzgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:22:01.600891 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:48428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0eaTCbgAP5jq5TehJZgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:22:07.060131 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:56748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0f6TCbgAP5jq5TehJcAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:13.258997 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:35640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0hbABkC4fWIHEf8EVnwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:22:39.111245 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:48224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0n7ysWC90G-1nBrBiDQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:40.527477 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:33480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0oNSswJuvopo3lOh-NgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:41.803522 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:33496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0of9ocpUE4ed4uDwRPQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:49.631643 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:33512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0qdSswJuvopo3lOh-PQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:58.394262 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0srABkC4fWIHEf8EVuAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:59.735854 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:32976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0s6TCbgAP5jq5TehJoAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:23:47.746417 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:32990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh049SswJuvopo3lOh-dQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:49.151287 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:45912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh05aQpVkWug9HeOt9RKQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:51.638994 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:45924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh058_BxrYCr4hPDw8H0AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:54.115621 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:45930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh06qQpVkWug9HeOt9RKwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:10.691983 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:45936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0-qQpVkWug9HeOt9RRgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:22.896062 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:52612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1BqTCbgAP5jq5TehJ0AAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:24:25.283517 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:57040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1CVajLEzk2WiQ-10wWQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:27.831486 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:57042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1C46lpbStxTqkSkuGqgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:41.754326 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:55496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1GbABkC4fWIHEf8EV7AAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:43.053542 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:51378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1G0r9dMAiw-8KANNmZAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:47.859066 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:58282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1H7ysWC90G-1nBrBipgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:24:59.669251 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1K_9ocpUE4ed4uDwR1QAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:25:57.102520 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:35858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1ZY6lpbStxTqkSkuG-gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:25:58.487817 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:49860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1ZlajLEzk2WiQ-10wgAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:26:07.711471 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:49868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1b6TCbgAP5jq5TehKDAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:27.559647 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:60640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1g0r9dMAiw-8KANNmpAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:26:39.723218 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:40800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1j7ysWC90G-1nBrBjIAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:52.879437 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.228.16:36220] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh1nEr9dMAiw-8KANNmsgAAAQ8"]
[Mon Mar 16 18:26:53.642471 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:53730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1nVajLEzk2WiQ-10wswAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:56.391071 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:52910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1oP9ocpUE4ed4uDwSLQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:57.738903 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:52916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1obysWC90G-1nBrBjJwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:27:37.603408 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:43056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1yf9ocpUE4ed4uDwSVAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:27:57.942925 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:41344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh13Ur9dMAiw-8KANNm_AAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:27:58.469622 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh13rysWC90G-1nBrBjUgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:29:40.259776 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:51510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2RKQpVkWug9HeOt9SsAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:29:41.647473 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:37920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2RbysWC90G-1nBrBjgQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:29:45.995354 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:37930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2Sc_BxrYCr4hPDw8IqwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:29:52.419510 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:52062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2UKQpVkWug9HeOt9SvgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:29:55.600668 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:37946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2U9SswJuvopo3lOh_DwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:30:02.837205 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.244.31:33616] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh2WlajLEzk2WiQ-10w9wAAAo4"]
[Mon Mar 16 18:30:03.648365 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:52974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2W_9ocpUE4ed4uDwSmAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:30:06.273067 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:52464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2XtSswJuvopo3lOh_FwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:30:12.899162 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:52470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2ZLABkC4fWIHEf8EWewAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:30:15.351316 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:38870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2Z6QpVkWug9HeOt9SwQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:30:45.347174 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:46514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2hf9ocpUE4ed4uDwSxAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:00.721077 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:38884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2lLysWC90G-1nBrBjuwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:10.302997 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:43594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2nqTCbgAP5jq5TehKggAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:11.584834 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:40806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2n8_BxrYCr4hPDw8I0gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:14.903879 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2oqQpVkWug9HeOt9S8AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:15.325417 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:37752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2o6QpVkWug9HeOt9S8QAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:20.834889 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:48806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2qNSswJuvopo3lOh_cwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:38.296130 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2utSswJuvopo3lOh_kAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:39.652192 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2u7ysWC90G-1nBrBjywAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:41.042485 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:53302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2vY6lpbStxTqkSkuHhQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:49.119581 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:50446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2xY6lpbStxTqkSkuHjgAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:51.353071 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:49086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2xv9ocpUE4ed4uDwS5QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:52.769756 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:49100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2yP9ocpUE4ed4uDwS6QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:58.724368 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.228.16:48414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh2zkr9dMAiw-8KANNnQwAAARQ"]
[Mon Mar 16 18:32:07.359610 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:46208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh217ABkC4fWIHEf8EW7AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:32:09.875448 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:50918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh22Y6lpbStxTqkSkuHlAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:32:10.535017 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:49110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh22rABkC4fWIHEf8EW9AAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:32:21.753164 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:44840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh25VajLEzk2WiQ-10xKwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:33:07.151036 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:37620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3E6TCbgAP5jq5TehKzwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:13.809988 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:43528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3Gc_BxrYCr4hPDw8JNQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:31.168158 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:49600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3K6QpVkWug9HeOt9TmAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:33.011171 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:38538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3LLABkC4fWIHEf8EXLAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:33:36.659723 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:37996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3L8_BxrYCr4hPDw8JXwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:37.998970 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:51850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3MUr9dMAiw-8KANNnbAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:34:37.743365 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:38552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3bc_BxrYCr4hPDw8JoAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:34:43.657087 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:46490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3c9SswJuvopo3lOiABQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:02.527222 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:37156] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh3ho6lpbStxTqkSkuH3AAAAlI"]
[Mon Mar 16 18:35:10.388862 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:46498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3jrysWC90G-1nBrBkQQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:35:17.050932 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:51854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3lbABkC4fWIHEf8EXpQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:31.916825 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:41548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3o7ysWC90G-1nBrBkVAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:35:41.960154 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:38750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3rc_BxrYCr4hPDw8JxAAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:46.573167 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:47450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3skr9dMAiw-8KANNnxQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:36:30.549933 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:50564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh33kr9dMAiw-8KANNoIQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:36:37.510791 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:45636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh35bABkC4fWIHEf8EXygAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:36:38.754941 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:42876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh35rABkC4fWIHEf8EXzAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:37:01.531218 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:42878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3_bABkC4fWIHEf8EX7AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:37:02.010835 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.228.16:41356] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh3_qTCbgAP5jq5TehLJgAAAs4"]
[Mon Mar 16 18:37:28.470342 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:42798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4GM_BxrYCr4hPDw8KCwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:37:58.024395 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:37142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4NrysWC90G-1nBrBkmwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:38:03.903152 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:47364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4O6QpVkWug9HeOt9UUAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:08.959425 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:47378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4QKQpVkWug9HeOt9UUwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:26.991173 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:35624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4UrABkC4fWIHEf8EYLgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:34.913546 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:57970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4WtSswJuvopo3lOiA3gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:38:36.114296 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:58538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4XI6lpbStxTqkSkuIOwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:16.051617 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:58542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4hLysWC90G-1nBrBkxgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:19.367717 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:42244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4h1ajLEzk2WiQ-10yMAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:20.621613 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:41198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4iKQpVkWug9HeOt9UigAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:21.692724 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:45472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4ibysWC90G-1nBrBkywAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:24.344686 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:45476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4jEr9dMAiw-8KANNomwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:31.151301 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:45482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4k46lpbStxTqkSkuIRwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:33.137262 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:46600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4laQpVkWug9HeOt9UlQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:33.544157 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4ldSswJuvopo3lOiA5wAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:41.722602 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4nf9ocpUE4ed4uDwTsQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:43.224258 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:34072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4n1ajLEzk2WiQ-10yMQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:48.071724 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4pFajLEzk2WiQ-10yNwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:54.199715 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:46100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4qo6lpbStxTqkSkuIXAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:40:03.121702 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.244.31:55666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh4s_9ocpUE4ed4uDwTxwAAAg8"]
[Mon Mar 16 18:40:06.812485 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:45558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4taTCbgAP5jq5TehLYgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:40:08.173210 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4uP9ocpUE4ed4uDwTzAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:40:41.971097 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:54610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh42f9ocpUE4ed4uDwUDAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:41:01.402891 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:45404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh47Ur9dMAiw-8KANNo2QAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:06.318533 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:42058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48v9ocpUE4ed4uDwUIgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:06.418242 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:50878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48v9ocpUE4ed4uDwUIwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:41:07.602208 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:42060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48_9ocpUE4ed4uDwUJAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:41:22.363625 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:42934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5ArysWC90G-1nBrBlOgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:41.807771 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:39842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5Ff9ocpUE4ed4uDwURAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:49.851864 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:40290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5HbysWC90G-1nBrBlYAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:42:02.422418 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.228.16:50236] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh5KtSswJuvopo3lOiBFwAAAJg"]
[Mon Mar 16 18:42:26.443264 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:40714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5QlajLEzk2WiQ-10yngAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:42:44.114393 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:51044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5VNSswJuvopo3lOiBOQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:43:07.550976 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:33208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5a0r9dMAiw-8KANNpOwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:43:58.828343 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:46844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5nrysWC90G-1nBrBltQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:44:07.491500 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:51082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5p6QpVkWug9HeOt9UvQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:44:08.926566 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:40508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5qEr9dMAiw-8KANNpQAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:36.219310 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:40516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5xKTCbgAP5jq5TehLnwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:38.562240 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:38320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5xqTCbgAP5jq5TehLoQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:44:39.830216 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:33498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5x7ABkC4fWIHEf8EYvAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:43.177801 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:50408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5y46lpbStxTqkSkuI7gAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:44:56.739684 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:33512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh52KQpVkWug9HeOt9U0AAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:45:01.453861 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:52056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh53bABkC4fWIHEf8EY3AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:03.569339 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.244.31:58084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh5346lpbStxTqkSkuI8AAAAk4"]
[Mon Mar 16 18:45:14.017601 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:48572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh56v9ocpUE4ed4uDwUsQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:19.079196 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:38330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh570r9dMAiw-8KANNpUgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:45:27.792852 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:56088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh59v9ocpUE4ed4uDwUvgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:30.292648 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:35888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5-qTCbgAP5jq5TehLpwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:46:07.965022 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:35904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6H0r9dMAiw-8KANNpfgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:09.217965 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:54280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6IaQpVkWug9HeOt9U3gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:10.541364 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:54288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6IqQpVkWug9HeOt9U3wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:12.716265 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:54304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6JKQpVkWug9HeOt9U4QAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:14.004455 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6JqTCbgAP5jq5TehLrwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:15.307362 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:54324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6J7ysWC90G-1nBrBl1wAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:16.608984 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:54328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6KI6lpbStxTqkSkuI9QAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:18.993554 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:54336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6KlajLEzk2WiQ-10zcAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:20.332873 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:39844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6LLABkC4fWIHEf8EZIgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:21.647135 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:39856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6LaQpVkWug9HeOt9U4wAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:22.833099 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:39858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6Lo6lpbStxTqkSkuI9wAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:24.162506 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:39874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6MFajLEzk2WiQ-10zdgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:25.431575 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:39880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6MaTCbgAP5jq5TehLugAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:28.464916 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:39882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6NKTCbgAP5jq5TehLwAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:37.919228 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:33556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6PaTCbgAP5jq5TehLzQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:44.079142 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:41232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6RLysWC90G-1nBrBl3QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:46.879582 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:41240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6RqTCbgAP5jq5TehL2QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:48.215704 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:52960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6SM_BxrYCr4hPDw8KswAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:49.527776 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:52972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6SbABkC4fWIHEf8EZJwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:54.162159 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:52976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6Ts_BxrYCr4hPDw8KvAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:04.147750 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.228.16:33146] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh6V1ajLEzk2WiQ-10ziwAAAoQ"]
[Mon Mar 16 18:47:07.055277 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:52986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6W8_BxrYCr4hPDw8K0AAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:23.531287 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:49446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6a1ajLEzk2WiQ-10zoAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:25.931899 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:60436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6bbABkC4fWIHEf8EZLgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:28.323295 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:60450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cKTCbgAP5jq5TehMAAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:29.641460 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cUr9dMAiw-8KANNpkAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:31.453167 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:35744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cv9ocpUE4ed4uDwU1QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:39.028979 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:35748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6e7ysWC90G-1nBrBl7AAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:42.547280 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:35696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6fs_BxrYCr4hPDw8K8AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:47:47.886516 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6g7ysWC90G-1nBrBl8gAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:49.217531 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:33956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6hUr9dMAiw-8KANNpkgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:08.755715 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:33966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6mLABkC4fWIHEf8EZSgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:10.147617 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:57338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6mrABkC4fWIHEf8EZTQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:20.343785 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:57344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6pLABkC4fWIHEf8EZXAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:48:21.638031 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:51904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6paQpVkWug9HeOt9U7wAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:48:47.809269 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:51918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6vs_BxrYCr4hPDw8LEgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:49.152682 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:34330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6waQpVkWug9HeOt9U8wAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:50.457974 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:34338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6wlajLEzk2WiQ-10ztQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:51.852971 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:34346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6w6TCbgAP5jq5TehMLAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:53.189125 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:34348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6xf9ocpUE4ed4uDwU2gAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:02.395776 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:34362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6zs_BxrYCr4hPDw8LJwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:03.780048 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:53622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6z9SswJuvopo3lOiBdAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:05.611255 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:53638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh60bABkC4fWIHEf8EZYwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:06.990029 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:53650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh60lajLEzk2WiQ-10zuAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:11.056071 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:46068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh618_BxrYCr4hPDw8LNgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:14.699470 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:46074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh62rysWC90G-1nBrBl_QAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:16.058624 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:46076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63LABkC4fWIHEf8EZZQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:17.346695 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:46082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63Ur9dMAiw-8KANNpmgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:18.656189 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:41334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63kr9dMAiw-8KANNpnAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:19.064984 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6346lpbStxTqkSkuJVAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:19.963022 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:41346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh630r9dMAiw-8KANNpnwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:26.705224 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:41360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh65s_BxrYCr4hPDw8LTAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:29.223656 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:41366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh66aTCbgAP5jq5TehMMgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:30.552791 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:34002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh66rABkC4fWIHEf8EZawAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:32.979795 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:34018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67Er9dMAiw-8KANNppAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:33.133325 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67Y6lpbStxTqkSkuJYQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:49:34.341634 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:34020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67rABkC4fWIHEf8EZbgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:37.772777 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh68bABkC4fWIHEf8EZdQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:40.247358 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:36988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69M_BxrYCr4hPDw8LWAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:41.582249 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:36996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69bysWC90G-1nBrBmAgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:42.937373 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:37000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69kr9dMAiw-8KANNppgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:45.398556 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:37010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6-Ur9dMAiw-8KANNpqAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:47.160276 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:37704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6-7ABkC4fWIHEf8EZfwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:48.931250 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:37018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6_P9ocpUE4ed4uDwU4wAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:51.316258 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:50144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6_6QpVkWug9HeOt9U-gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:52.848150 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:40108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7AI6lpbStxTqkSkuJZwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:49:53.738977 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:50160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7AdSswJuvopo3lOiBewAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:56.399604 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:50168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7A46lpbStxTqkSkuJawAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:57.709564 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:50176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7BbABkC4fWIHEf8EZggAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:03.358915 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:44320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7C1ajLEzk2WiQ-10zwwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:09.194888 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:44322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7Ef9ocpUE4ed4uDwU7QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:15.732926 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:53114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7F9SswJuvopo3lOiBhgAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:23.603163 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:53124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7H46lpbStxTqkSkuJkQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:26.225400 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:38414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7IqTCbgAP5jq5TehMOQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:28.617120 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:38416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7JNSswJuvopo3lOiBiAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:45.002893 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:57820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7NdSswJuvopo3lOiBoAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:47.495077 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:43380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7N46lpbStxTqkSkuJrAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:48.743653 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:60888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7OP9ocpUE4ed4uDwU9AAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:51:01.601088 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:60898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7RaQpVkWug9HeOt9VCgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:51:17.721990 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:53312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7VY6lpbStxTqkSkuJywAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:04.015190 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.228.16:47382] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh7hFajLEzk2WiQ-100BAAAApI"]
[Mon Mar 16 18:52:04.764059 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7hM_BxrYCr4hPDw8L0AAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:06.086621 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:47306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7hlajLEzk2WiQ-100CgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:07.269570 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:47314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7h1ajLEzk2WiQ-100DQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:12.177591 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:40980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jI6lpbStxTqkSkuJ3AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:13.500607 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:40986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jUr9dMAiw-8KANNqNAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:14.884222 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:40998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jrysWC90G-1nBrBmWQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:16.207317 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:41014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7kNSswJuvopo3lOiBtQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:17.538929 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:41020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7kUr9dMAiw-8KANNqOQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:18.927752 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:56654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ktSswJuvopo3lOiBtgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:20.249258 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:56660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7lP9ocpUE4ed4uDwVFAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:22.733979 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ltSswJuvopo3lOiBuAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:25.654076 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:56680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7mbABkC4fWIHEf8EZrAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:27.115888 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:56692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7m_9ocpUE4ed4uDwVFwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:29.931047 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:34134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7naQpVkWug9HeOt9VGAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:31.231067 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:34144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7n_9ocpUE4ed4uDwVGQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:32.613810 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:34152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7oKQpVkWug9HeOt9VGQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:33.950241 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7obABkC4fWIHEf8EZrQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:36.558492 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:34180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7pKTCbgAP5jq5TehMkgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:37.888847 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:34182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7pf9ocpUE4ed4uDwVHQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:39.200596 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:41544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7p46lpbStxTqkSkuJ4AAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:40.583681 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:41550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7qNSswJuvopo3lOiBuwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:41.923075 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:41562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7qaQpVkWug9HeOt9VGgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:43.241802 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:41578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7q6QpVkWug9HeOt9VHAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:44.516859 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:41588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7rI6lpbStxTqkSkuJ5AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:45.167830 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:51744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7raTCbgAP5jq5TehMmgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:45.861306 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:41604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7rc_BxrYCr4hPDw8L1gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:47.239274 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:41608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7r_9ocpUE4ed4uDwVHwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:48.577564 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:53102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7sFajLEzk2WiQ-100GAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:50.023555 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:53114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7sv9ocpUE4ed4uDwVIAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:52.421526 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:53118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7tI6lpbStxTqkSkuJ6QAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:53.790776 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:53128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7tf9ocpUE4ed4uDwVIQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:55.175340 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:53138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7t6QpVkWug9HeOt9VIAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:56.479289 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:53144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7uKQpVkWug9HeOt9VIQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:57.782823 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:53154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7uaTCbgAP5jq5TehMnAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:58.888803 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:45768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ukr9dMAiw-8KANNqWgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:01.750956 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7vbABkC4fWIHEf8EZswAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:03.047272 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:45792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7v6TCbgAP5jq5TehMnQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:04.203698 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:45802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7wFajLEzk2WiQ-100HAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:06.606619 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:45814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7wlajLEzk2WiQ-100HgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:07.917497 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:45830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7w6TCbgAP5jq5TehMngAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:09.086400 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7xaTCbgAP5jq5TehMoAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:10.447266 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:55890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7xqQpVkWug9HeOt9VIwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:11.788885 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:55900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7x8_BxrYCr4hPDw8L3gAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:13.093887 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:55906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7yc_BxrYCr4hPDw8L4QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:15.595663 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:55914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ys_BxrYCr4hPDw8L5AAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:16.879305 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:55930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7zFajLEzk2WiQ-100IAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:18.046600 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:54004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7zv9ocpUE4ed4uDwVJgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:19.383853 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7z6TCbgAP5jq5TehMpAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:20.245603 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:55964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh70NSswJuvopo3lOiB3gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:53:20.679025 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:54024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh70LABkC4fWIHEf8EZvQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:39.689744 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:54014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh740r9dMAiw-8KANNqegAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:54:02.436676 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:49118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7-VajLEzk2WiQ-100PwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:54:09.664325 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:59442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8AVajLEzk2WiQ-100RQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:54:49.863691 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:54034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8KY6lpbStxTqkSkuKQwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:04.023617 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.244.31:58118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh8ONSswJuvopo3lOiB9wAAAIg"]
[Mon Mar 16 18:55:04.949251 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:56564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8OLysWC90G-1nBrBmrAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:15.033424 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:56578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Q1ajLEzk2WiQ-100WAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:18.630390 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:37278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Rkr9dMAiw-8KANNqtQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:55:32.365482 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:36676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8VI6lpbStxTqkSkuKVQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:38.645106 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:60410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8WrysWC90G-1nBrBmyQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:55:43.262116 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:33614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8X7ysWC90G-1nBrBm0gAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:47.298976 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:43118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Y6QpVkWug9HeOt9VpQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:49.963900 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:40822] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ZI6lpbStxTqkSkuKWQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:55:49.998707 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:39260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ZbABkC4fWIHEf8EaDgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:14.603849 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:40828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8frABkC4fWIHEf8EaLAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:15.858640 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:42550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8f7ABkC4fWIHEf8EaLgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:22.459231 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:42554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ho6lpbStxTqkSkuKYQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:40.479438 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:49506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8mEr9dMAiw-8KANNq3QAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:51.706937 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:33208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8oo6lpbStxTqkSkuKaAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:53.042963 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:44734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8paTCbgAP5jq5TehMzgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:54.262220 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:44736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8prysWC90G-1nBrBnPQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:55.539807 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:44744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8p7ABkC4fWIHEf8EaOgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:56.826763 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:44760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8qLysWC90G-1nBrBnQwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:58.013971 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:50500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8qkr9dMAiw-8KANNq7QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:59.148155 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:50514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8q0r9dMAiw-8KANNq7wAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:00.442083 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:50518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8rNSswJuvopo3lOiCAAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:02.694558 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:50524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8raQpVkWug9HeOt9VrwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:04.034613 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:50530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8sFajLEzk2WiQ-100YgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:05.306935 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:50532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8saQpVkWug9HeOt9VsAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:06.647002 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:52608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh8stSswJuvopo3lOiCAgAAAIQ"]
[Mon Mar 16 18:57:06.674452 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:50548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8sqQpVkWug9HeOt9VsQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:07.819010 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:50552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8s9SswJuvopo3lOiCBAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:09.122166 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:57592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8tf9ocpUE4ed4uDwVtgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:10.300037 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:57600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8to6lpbStxTqkSkuKagAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:12.999727 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:57606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8uP9ocpUE4ed4uDwVuwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:15.642863 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:57612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8us_BxrYCr4hPDw8MXgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:18.011054 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:57620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8vqTCbgAP5jq5TehM2AAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:19.332932 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:59204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8v1ajLEzk2WiQ-100ZgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:20.547790 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:59210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8wFajLEzk2WiQ-100ZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:21.870986 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8wVajLEzk2WiQ-100agAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:23.030253 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:40164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8w7ysWC90G-1nBrBnbQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:24.278100 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:59228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xM_BxrYCr4hPDw8MYQAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:25.591152 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:59244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xdSswJuvopo3lOiCBwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:26.807035 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:59252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xrABkC4fWIHEf8EaQgAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:29.922413 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:59760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8yaQpVkWug9HeOt9VugAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:32.202455 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:59766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8y9SswJuvopo3lOiCCAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:33.529340 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:59782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8zY6lpbStxTqkSkuKbgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:34.722333 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:59792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8zrysWC90G-1nBrBndgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:36.030156 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:59798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80LysWC90G-1nBrBneQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:37.289184 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:59810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80Ur9dMAiw-8KANNrHAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:38.511462 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:43138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80lajLEzk2WiQ-100bwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:38.560241 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:35436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80qTCbgAP5jq5TehM5wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:40.982966 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:43146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh81FajLEzk2WiQ-100dgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:42.313112 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:43160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh81o6lpbStxTqkSkuKbwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:43.209449 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:50492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh811ajLEzk2WiQ-100eAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:43.507536 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:43166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh817ABkC4fWIHEf8EaRwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:44.791448 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:43168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh82M_BxrYCr4hPDw8MYwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:45.935597 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:43170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh82f9ocpUE4ed4uDwVwgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:48.345808 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:43182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83P9ocpUE4ed4uDwVxAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:48.790175 2026] [mime_magic:error] [pid 14895:tid 140411540502272] (70014)End of file found: [client 74.7.243.203:56192] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/kbd
[Mon Mar 16 18:57:49.680314 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:40824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83Y6lpbStxTqkSkuKcAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:50.847053 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83o6lpbStxTqkSkuKcwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:52.115329 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:40846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh84KTCbgAP5jq5TehM6AAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:54.367484 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:40848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh84bysWC90G-1nBrBnggAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:55.674995 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:40862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh847ABkC4fWIHEf8EaSwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:56.843392 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:40876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh85KTCbgAP5jq5TehM6QAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:58.184181 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:59968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh85s_BxrYCr4hPDw8MbgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:59.377108 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:59972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8546lpbStxTqkSkuKdAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:00.651741 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:59980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh86P9ocpUE4ed4uDwVxgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:03.923397 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:60004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh866TCbgAP5jq5TehM6wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:05.619525 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:60008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh87aTCbgAP5jq5TehM7gAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:08.182992 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:60024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh88KTCbgAP5jq5TehM8gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:09.907581 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:46456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh88c_BxrYCr4hPDw8MfAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:19.885059 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:46462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8-8_BxrYCr4hPDw8MhwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:58:22.211764 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:44928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8_o6lpbStxTqkSkuKhQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:58:50.390850 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:44934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9GlajLEzk2WiQ-100oQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:55.108603 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:44318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9H0r9dMAiw-8KANNrTQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:59:28.657670 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9QNSswJuvopo3lOiChQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:59:36.183605 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:59782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9SNSswJuvopo3lOiClAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:59:48.446326 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:37782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9VM_BxrYCr4hPDw8MygAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:59:49.436772 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:59796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9VY6lpbStxTqkSkuK-QAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:00:04.987008 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:58020] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh9ZLABkC4fWIHEf8EahwAAAFc"]
[Mon Mar 16 19:00:37.151238 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9g7ysWC90G-1nBrBnxQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 19:01:13.309254 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:34998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9qf9ocpUE4ed4uDwWAwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:16.825350 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:45918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9rLABkC4fWIHEf8EbGwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:18.109837 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:58576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9rkr9dMAiw-8KANNrZwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:24.079577 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:58590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9tLysWC90G-1nBrBn3AAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:35.394572 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:58598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9v0r9dMAiw-8KANNrdAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:37.962557 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:34642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9wUr9dMAiw-8KANNrdgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:40.550981 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:36088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9xLysWC90G-1nBrBn7QAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:41.326766 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:38230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9xUr9dMAiw-8KANNregAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:44.735579 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:38242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9yKQpVkWug9HeOt9V6AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:47.035480 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:38246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9y8_BxrYCr4hPDw8M6gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:01.615291 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:36220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh92aQpVkWug9HeOt9V-QAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:08.060049 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:58456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh94LABkC4fWIHEf8EbJgAAAEg"]
[Mon Mar 16 19:02:15.449324 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:43310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh956QpVkWug9HeOt9WBgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:20.483023 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:56978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh97LABkC4fWIHEf8EbKwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:02:45.104726 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:55264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-Bf9ocpUE4ed4uDwWKAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:51.548224 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:35096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-C7ABkC4fWIHEf8EbQgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:55.795896 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:40722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-D7ysWC90G-1nBrBoKgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:03:41.635580 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:40726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-PVajLEzk2WiQ-101PQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:03:46.440646 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:34326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-Qs_BxrYCr4hPDw8NBgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:03:54.118261 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:59488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-StSswJuvopo3lOiDVAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 19:05:03.558216 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:34336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-j6QpVkWug9HeOt9WaAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:04.910421 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-kKTCbgAP5jq5TehNsgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:05.319284 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.244.31:53678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh-kbysWC90G-1nBrBohQAAAYo"]
[Mon Mar 16 19:05:19.801592 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:33716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-n6QpVkWug9HeOt9WdgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:42.794143 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:36486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-tv9ocpUE4ed4uDwWqgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:05:50.836130 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:56354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-vo6lpbStxTqkSkuLpQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:06:04.454942 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:60398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-zNSswJuvopo3lOiDmwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:41.528005 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:52914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-8bysWC90G-1nBrBoswAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:42.817522 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:41780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-8v9ocpUE4ed4uDwWtgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:50.522918 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:41794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh--lajLEzk2WiQ-101iwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:06:55.000194 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:49756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-_o6lpbStxTqkSkuLxAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:06:56.299091 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:49764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_AKTCbgAP5jq5TehNxgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:07:06.184770 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:49772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Ckr9dMAiw-8KANNr6wAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:07:08.819191 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.228.16:48002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh_DLysWC90G-1nBrBotgAAAZc"]
[Mon Mar 16 19:07:37.513809 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:56214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Kc_BxrYCr4hPDw8NrAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:02.948468 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:42158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Qkr9dMAiw-8KANNsCwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:05.227436 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:35226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Rc_BxrYCr4hPDw8NuAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:06.602293 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:35238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_RqTCbgAP5jq5TehN2gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:08.830589 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:35254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_SLysWC90G-1nBrBowgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:10.109605 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:49050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_SlajLEzk2WiQ-101nAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:13.371166 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:49052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_TbysWC90G-1nBrBoyQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:14.855241 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_TrABkC4fWIHEf8EcUAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:16.053992 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:49078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ULABkC4fWIHEf8EcUgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:18.367917 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:49090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_UtSswJuvopo3lOiDxwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:19.717328 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_U1ajLEzk2WiQ-101ngAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:21.915460 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:39086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_VY6lpbStxTqkSkuMGQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:23.244152 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:39098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_V_9ocpUE4ed4uDwW0gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:26.222890 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_WaQpVkWug9HeOt9WuQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:27.678979 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:39126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_W_9ocpUE4ed4uDwW1QAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:28.904311 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:55120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_XLABkC4fWIHEf8EcVgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:30.258955 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:55134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_XrysWC90G-1nBrBo1wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:35.655347 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:57534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Y6QpVkWug9HeOt9WxAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:40.350986 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.243.203:36636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Z0r9dMAiw-8KANNsGAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:49.518466 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:40672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_cVajLEzk2WiQ-101sAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:51.272335 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_c_9ocpUE4ed4uDwW6wAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:54.780568 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:51470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_dtSswJuvopo3lOiD3QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:59.336409 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:51478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_e46lpbStxTqkSkuMOgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:00.622293 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:49954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_fFajLEzk2WiQ-101swAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:01.783800 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:49970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_fbysWC90G-1nBrBo7QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:03.121924 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:49972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_f7ysWC90G-1nBrBo7gAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:05.384518 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:49982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_gbysWC90G-1nBrBo9QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:06.673085 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:49996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_glajLEzk2WiQ-101tAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:14.942250 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:50010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_iqTCbgAP5jq5TehN-gAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:16.246958 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:49996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_jM_BxrYCr4hPDw8N0AAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:18.526987 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:50010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_jrABkC4fWIHEf8EcagAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:24.419024 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:42250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_lKQpVkWug9HeOt9W7QAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:27.124596 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:42258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_lY6lpbStxTqkSkuMPwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:30.556443 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:44556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_mkr9dMAiw-8KANNsKgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:38.665082 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:44568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_oqQpVkWug9HeOt9W_wAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:02.607918 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:41806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ukr9dMAiw-8KANNsRQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:05.039960 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:41876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_vVajLEzk2WiQ-101zgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:10:06.938041 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.244.31:46272] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh_vqTCbgAP5jq5TehOCAAAAtg"]
[Mon Mar 16 19:10:22.021215 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:48862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ztSswJuvopo3lOiENwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:37.931997 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_3bysWC90G-1nBrBpKwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:44.643320 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:55490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_5LABkC4fWIHEf8EclQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:47.053979 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:55506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_546lpbStxTqkSkuMYQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:57.057627 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:36636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_8Y6lpbStxTqkSkuMbAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:11:10.286943 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:59214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh__tSswJuvopo3lOiEVAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:11:32.501352 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAFI6lpbStxTqkSkuMgwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:11:46.319514 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:40578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAIUr9dMAiw-8KANNscgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:11:47.668848 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:34830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAI6TCbgAP5jq5TehOcQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:09.667058 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.228.16:35244] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiAOVajLEzk2WiQ-101-AAAApE"]
[Mon Mar 16 19:12:15.558134 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:45598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAP7ysWC90G-1nBrBpgwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:16.902895 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:34968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAQLysWC90G-1nBrBphgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:20.211654 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:45362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiARLysWC90G-1nBrBpjAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:26.141565 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiASv9ocpUE4ed4uDwXPAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:34.465504 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:46400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAUqTCbgAP5jq5TehOsgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:36.707008 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:45382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVLABkC4fWIHEf8Ec4QAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:37.972287 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:57796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVUr9dMAiw-8KANNsgwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:12:37.982911 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:54306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVc_BxrYCr4hPDw8OEwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:39.165503 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:60078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAV7ABkC4fWIHEf8Ec4gAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:40.497399 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:60080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAWKQpVkWug9HeOt9XcgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:43.417173 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:57802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAW9SswJuvopo3lOiEfQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:12:43.827421 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:60082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAW7ABkC4fWIHEf8Ec6gAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:46.796884 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:60090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAXrysWC90G-1nBrBprwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:51.508130 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:60102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAY7ABkC4fWIHEf8Ec7gAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:52.811134 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:42680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAZEr9dMAiw-8KANNshgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:56.212959 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:42694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAaLysWC90G-1nBrBpvQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:01.838200 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:42698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAbUr9dMAiw-8KANNsjQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:05.262887 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:40108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAcUr9dMAiw-8KANNskAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:09.879248 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:40112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAdaTCbgAP5jq5TehO0AAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:12.472573 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:39734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAeKQpVkWug9HeOt9XewAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:13.781964 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:39744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAebABkC4fWIHEf8Ec8gAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:17.280011 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:39758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAfbysWC90G-1nBrBpzQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:19.732006 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:39778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAf_9ocpUE4ed4uDwXSwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:35.147723 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:39780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAj_9ocpUE4ed4uDwXWwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:39.467641 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:49398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAk8_BxrYCr4hPDw8OIQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:40.767485 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:52322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlLABkC4fWIHEf8Ec9gAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:41.508586 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlaTCbgAP5jq5TehO7wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:41.959602 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:52334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlbysWC90G-1nBrBp0gAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:44.315420 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:52346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAmM_BxrYCr4hPDw8OJwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:13:53.467835 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:60112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAobysWC90G-1nBrBp3AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:58.176218 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:38386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiApqTCbgAP5jq5TehO-wAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:58.371062 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiApqQpVkWug9HeOt9XigAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:59.715335 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:44340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAp8_BxrYCr4hPDw8OKwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:09.399567 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:38400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAsaTCbgAP5jq5TehPCAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 19:14:16.401877 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:44348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAuLysWC90G-1nBrBp7AAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:17.743326 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:48600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAudSswJuvopo3lOiE2AAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:19.017822 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:55154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAu7ABkC4fWIHEf8EdAQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:32.650635 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:55156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAx6TCbgAP5jq5TehPGAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:40.770854 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:43214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA0FajLEzk2WiQ-102IAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:42.172871 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:46042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA0rysWC90G-1nBrBp7gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:57.749182 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:41402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA4c_BxrYCr4hPDw8OYwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:15:07.867848 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.244.31:53548] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiA67ysWC90G-1nBrBp9gAAAY4"]
[Mon Mar 16 19:15:30.311287 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:41898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBAs_BxrYCr4hPDw8OoQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:44.120842 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:36492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEKQpVkWug9HeOt9XxAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:45.469514 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:38014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEVajLEzk2WiQ-102KgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:46.679180 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:38026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEtSswJuvopo3lOiFEwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:47.997678 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:38034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBE9SswJuvopo3lOiFFAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:48.893199 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:55932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBFLysWC90G-1nBrBqCAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 19:15:50.319425 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:43330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBFrABkC4fWIHEf8EdJAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:53.790784 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:43346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBGY6lpbStxTqkSkuMwgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:59.463452 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:43362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBH7ABkC4fWIHEf8EdKwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:00.753215 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:35172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBIM_BxrYCr4hPDw8O0wAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:03.992782 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:35184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBI9SswJuvopo3lOiFFwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:06.383201 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:35186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBJtSswJuvopo3lOiFGQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:13.263242 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:35192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBLc_BxrYCr4hPDw8O8QAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:16.526933 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:36446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBL1ajLEzk2WiQ-102OAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:17.842929 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:36450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBMbysWC90G-1nBrBqCQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:19.014007 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:37142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBM46lpbStxTqkSkuMxQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:20.342735 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:37150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNKQpVkWug9HeOt9XyAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:21.544343 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:37154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNaQpVkWug9HeOt9XyQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:22.672238 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:37156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNs_BxrYCr4hPDw8PAwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:30.291677 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:37164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBPqTCbgAP5jq5TehPNgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:31.555455 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBP9SswJuvopo3lOiFIAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:34.896637 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:36364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBQqTCbgAP5jq5TehPOgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:37.256363 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:36372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBRY6lpbStxTqkSkuMyAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:38.555761 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:54094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBRtSswJuvopo3lOiFIgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:40.692330 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:54102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBSFajLEzk2WiQ-102PwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:44.036719 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTLysWC90G-1nBrBqFQAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:45.347881 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:54112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTbysWC90G-1nBrBqGQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:46.494571 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:54126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTs_BxrYCr4hPDw8PKQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:48.806956 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:54142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBUM_BxrYCr4hPDw8PMAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:50.064876 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:39690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBUv9ocpUE4ed4uDwXiAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:53.556478 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:39694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBVf9ocpUE4ed4uDwXjgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:55.863199 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:39710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBV0r9dMAiw-8KANNtSQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:06.143820 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:39714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBYo6lpbStxTqkSkuM0wAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:07.466976 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:43724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBY_9ocpUE4ed4uDwXkAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:10.387517 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:55356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBZEr9dMAiw-8KANNtWQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:14.804289 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:55360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBaqTCbgAP5jq5TehPRAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:19.826646 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:55368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBb_9ocpUE4ed4uDwXlQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:21.131714 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:59830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBcc_BxrYCr4hPDw8PWQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:22.276484 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:59840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBclajLEzk2WiQ-102TAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:23.566993 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:59842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBc6QpVkWug9HeOt9XzwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:26.867838 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:59858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBdqQpVkWug9HeOt9X1gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:32.524757 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:55992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBfI6lpbStxTqkSkuM3AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:34.499410 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:56004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBfVajLEzk2WiQ-102UQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:35.822415 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:56016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBf1ajLEzk2WiQ-102UwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:36.634756 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:43398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBgEr9dMAiw-8KANNtcAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:02.055121 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:60436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBmrABkC4fWIHEf8EdXwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:05.215490 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:56026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBnVajLEzk2WiQ-102cQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:18:07.590101 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:54684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBn6QpVkWug9HeOt9X3AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:08.770199 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:41982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBoEr9dMAiw-8KANNtdwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:12.214977 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:38362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBpFajLEzk2WiQ-102dAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:28.827579 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:38374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBtEr9dMAiw-8KANNtjgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:32.203162 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:38810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBuM_BxrYCr4hPDw8PlgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:56.048056 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:38824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB0I6lpbStxTqkSkuM9wAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:57.385599 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:57476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB0aQpVkWug9HeOt9X6AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:00.860194 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:40918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB1KTCbgAP5jq5TehPVAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:04.581766 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:40928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB2FajLEzk2WiQ-102fwAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:40.394582 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB_LABkC4fWIHEf8EdxAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:41.813049 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:45658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB_c_BxrYCr4hPDw8P3gAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:19:45.069982 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:45674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCAf9ocpUE4ed4uDwXwwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:19:57.306618 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:40944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCDKQpVkWug9HeOt9YHAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:20:08.096785 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.244.31:58760] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiCGFajLEzk2WiQ-102mwAAAo8"]
[Mon Mar 16 19:20:30.999209 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:45676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCLqTCbgAP5jq5TehPiAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:20:37.359147 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:42024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCNbysWC90G-1nBrBqhQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:20:45.304254 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:60564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCPY6lpbStxTqkSkuNJgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:20:57.300364 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCSY6lpbStxTqkSkuNOAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:21:01.725801 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:45154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCTY6lpbStxTqkSkuNQQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:21:01.799215 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:60566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCTY6lpbStxTqkSkuNQgAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:21:27.782474 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:39458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCZ8_BxrYCr4hPDw8QVgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:06.552355 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:58992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCjv9ocpUE4ed4uDwYFgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:12.245865 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:37524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiClEr9dMAiw-8KANNtzgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:27.461070 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:52726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCo9SswJuvopo3lOiGGgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:43.762599 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:33886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCs8_BxrYCr4hPDw8QkQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:48.205884 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:56816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCuLABkC4fWIHEf8EeIAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:49.436453 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:58866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCuaQpVkWug9HeOt9YOQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:06.153104 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:52106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCyrABkC4fWIHEf8EeMwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:25.118837 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:58868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC3c_BxrYCr4hPDw8QtgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:26.472770 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:46088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC3s_BxrYCr4hPDw8QuAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:32.578298 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:46094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5KTCbgAP5jq5TehPmAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:33.882774 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:49582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5f9ocpUE4ed4uDwYKwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:34.548383 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:54984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5kr9dMAiw-8KANNt5wAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:37.291390 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:49584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC6aQpVkWug9HeOt9YQAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:46.131205 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:48312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC8tSswJuvopo3lOiGTQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:23:48.514867 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:48316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC9P9ocpUE4ed4uDwYOAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:50.927162 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:39908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC9o6lpbStxTqkSkuNXwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:24:18.867397 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:39916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDErysWC90G-1nBrBqwQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:24:29.623098 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:52066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDHdSswJuvopo3lOiGewAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:24:38.872966 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:53424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDJqTCbgAP5jq5TehPpQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:24:43.590853 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:41110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDK6TCbgAP5jq5TehPqQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:24:47.200110 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:41112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDL7ABkC4fWIHEf8EeUgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:25:31.719018 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.243.203:41124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDW8_BxrYCr4hPDw8RMAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:25:54.015055 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:50278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDcFajLEzk2WiQ-104OQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:25:58.367649 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:48312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDdv9ocpUE4ed4uDwYowAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:26:16.677939 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:57860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDiNSswJuvopo3lOiGpwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:26:22.619787 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:43852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDjrysWC90G-1nBrBq2wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:26:25.011803 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:53996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDkc_BxrYCr4hPDw8ROAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:26:58.812852 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDsv9ocpUE4ed4uDwY3gAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:08.143055 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:46092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDvLysWC90G-1nBrBq_AAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:14.080875 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:40870] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiDwtSswJuvopo3lOiGxQAAAI4"]
[Mon Mar 16 19:27:18.903829 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:40800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDxs_BxrYCr4hPDw8RVwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:20.189774 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:39182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDyM_BxrYCr4hPDw8RWAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:24.675607 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:39186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDzLABkC4fWIHEf8EerQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:32.759301 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:39202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD1Er9dMAiw-8KANNuMQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:35.413806 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:57324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD19SswJuvopo3lOiG1gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:28:02.165928 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:57326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD8s_BxrYCr4hPDw8RbQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:21.741223 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:57118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEBVajLEzk2WiQ-104dwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:28:24.081283 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:57618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiECFajLEzk2WiQ-104eQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:36.214616 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:57630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEFKQpVkWug9HeOt9ZAQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:38.710872 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:60140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEFrysWC90G-1nBrBrJQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:28:41.140153 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:54788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEGf9ocpUE4ed4uDwZBQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:28:51.126966 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:58972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEI6TCbgAP5jq5TehQdwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:52.320084 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:54794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEJEr9dMAiw-8KANNuZAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:29:13.917912 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:33098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEObysWC90G-1nBrBrPgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:29:31.428257 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:54034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiES46lpbStxTqkSkuOFAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:29:34.860346 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:38596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiETs_BxrYCr4hPDw8RgwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:29:44.956694 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:38608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEWM_BxrYCr4hPDw8RkgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:29:50.691561 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:38630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEXtSswJuvopo3lOiHGAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:09.688689 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:56578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEcbysWC90G-1nBrBrWgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:10.958944 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:40018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEclajLEzk2WiQ-104twAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:11.609054 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.244.31:40500] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiEc7ysWC90G-1nBrBrWwAAAZc"]
[Mon Mar 16 19:30:16.027067 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEeP9ocpUE4ed4uDwZTAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:18.152470 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:40026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEes_BxrYCr4hPDw8RnQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:40.270889 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:59576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEkFajLEzk2WiQ-1048QAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 19:30:45.501769 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:51214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiElEr9dMAiw-8KANNu2AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:46.752460 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:59246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiElqTCbgAP5jq5TehQjgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:51.623079 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:57372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEm8_BxrYCr4hPDw8RpQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:52.913606 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEnKQpVkWug9HeOt9ZHgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:54.212868 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:57378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEnrysWC90G-1nBrBrZgAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:56.146060 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:41956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEoLABkC4fWIHEf8EfLQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:31:52.235316 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:57394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiE2LysWC90G-1nBrBrmwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:31:54.684885 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:38912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiE2tSswJuvopo3lOiHbAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:32:15.353681 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.228.16:56236] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiE70r9dMAiw-8KANNu8wAAAQY"]
[Mon Mar 16 19:32:44.375064 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:42520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFDNSswJuvopo3lOiHqwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:25.998888 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:38926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFNaTCbgAP5jq5TehQ8gAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:29.436468 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:49858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFOc_BxrYCr4hPDw8R4AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:32.837677 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFPKQpVkWug9HeOt9ZOQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:34.095756 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:39350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFPqTCbgAP5jq5TehQ9gAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:35.307954 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:39362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFP46lpbStxTqkSkuOMgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:36.417335 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:39368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQI6lpbStxTqkSkuONAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:37.705922 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:39380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQY6lpbStxTqkSkuONQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:38.922587 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:41120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQo6lpbStxTqkSkuOOAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:40.225336 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:41126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRLABkC4fWIHEf8Ef9AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:41.527620 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:41140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRbysWC90G-1nBrBrsAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:42.728621 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:41150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRkr9dMAiw-8KANNvGQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:44.026970 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:41152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSKTCbgAP5jq5TehQ-wAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:45.214576 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:41156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSdSswJuvopo3lOiHtgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:46.552315 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:41162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSqTCbgAP5jq5TehQ_gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:47.744543 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:41176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFS9SswJuvopo3lOiHtwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:48.904693 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:46284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFTLysWC90G-1nBrBrswAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:50.228420 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:46288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFTo6lpbStxTqkSkuOOwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:51.368575 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:46298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFT7ABkC4fWIHEf8EgAAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:52.747457 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:46310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFUKQpVkWug9HeOt9ZPAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:55.082799 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFUlajLEzk2WiQ-105ZgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:56.475772 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:46340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFVM_BxrYCr4hPDw8R-QAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:58.048954 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:46356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFVbysWC90G-1nBrBrtgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:59.353500 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:45794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFV6TCbgAP5jq5TehRAwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:01.409472 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFWNSswJuvopo3lOiHuQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:02.734958 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:45806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFWqTCbgAP5jq5TehRCgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:03.900657 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:45808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFW6TCbgAP5jq5TehRDQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:05.181356 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:45816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFXVajLEzk2WiQ-105ZwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:09.521831 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:45820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFYdSswJuvopo3lOiHvgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:12.959589 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:57246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFZLABkC4fWIHEf8EgEgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:34:14.211208 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:37948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFZrysWC90G-1nBrBrwQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:40.975477 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:37954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFgP9ocpUE4ed4uDwZywAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:34:57.176271 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:54972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFkbABkC4fWIHEf8EgJgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:35:12.931467 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.244.31:38380] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiFoFajLEzk2WiQ-105eQAAApM"]
[Mon Mar 16 19:35:13.437497 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:39154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFodSswJuvopo3lOiH2AAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:35:21.455548 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFqf9ocpUE4ed4uDwZ2QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:35:23.805479 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:58760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFq7ABkC4fWIHEf8EgLgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:35:25.117943 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:58776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFrY6lpbStxTqkSkuOTgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:36:14.750927 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:58786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiF3v9ocpUE4ed4uDwaEAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:36:44.966523 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:35602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiF_Er9dMAiw-8KANNvVwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:37:15.370885 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:49712] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiGG9SswJuvopo3lOiIFgAAAJE"]
[Mon Mar 16 19:37:22.507428 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:46648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGItSswJuvopo3lOiIHwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:18.851697 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:59698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGWc_BxrYCr4hPDw8TIQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:24.023068 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:35788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGYFajLEzk2WiQ-106DwAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:30.245482 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:34320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGZkr9dMAiw-8KANNvagAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:41.008045 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:43254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGcVajLEzk2WiQ-106GgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:42.313108 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGckr9dMAiw-8KANNvbAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:43.665425 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:35260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGc6TCbgAP5jq5TehRsQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:57.524090 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:35270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGgc_BxrYCr4hPDw8TWAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:39:05.647779 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:37512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGif9ocpUE4ed4uDwadAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:39:19.272383 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:37526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGl7ysWC90G-1nBrBsnQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:40:09.780611 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:58346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGyf9ocpUE4ed4uDwa5gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:40:16.106882 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.244.31:43374] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiG0NSswJuvopo3lOiIjgAAAIg"]
[Mon Mar 16 19:40:26.082366 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:35492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG2s_BxrYCr4hPDw8TnAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:40:54.499736 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:58852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG9tSswJuvopo3lOiIzQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:41:00.143135 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:41052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG_LABkC4fWIHEf8EgkwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:41:05.583054 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:39262] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHAbABkC4fWIHEf8EgnQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:41:59.294427 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:46098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHN7ysWC90G-1nBrBtDQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:42:02.626933 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:44592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHOo6lpbStxTqkSkuOnQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:42:14.980185 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:44600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHRlajLEzk2WiQ-106YwAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:42:16.137570 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.228.16:33086] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiHSM_BxrYCr4hPDw8TvwAAAcc"]
[Mon Mar 16 19:42:22.282726 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:39264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHTqTCbgAP5jq5TehSeAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:43:09.832734 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:45112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHff9ocpUE4ed4uDwbZwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:43:12.275850 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:38000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHgM_BxrYCr4hPDw8UCwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:44:24.315678 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:38006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHyEr9dMAiw-8KANNv-gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:44:30.942593 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:51272] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHzrysWC90G-1nBrBtOAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:38.064742 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:37102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH1v9ocpUE4ed4uDwbxAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:39.347253 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:45872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH17ABkC4fWIHEf8EhPQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:45.878484 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:43318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH3Ur9dMAiw-8KANNwBwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:45:08.419154 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:37962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH9I6lpbStxTqkSkuO4gAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:45:09.756541 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:53466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH9aQpVkWug9HeOt9Z9AAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:16.140085 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.244.31:33108] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiH_I6lpbStxTqkSkuO5AAAAko"]
[Mon Mar 16 19:45:19.659331 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:53476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH__9ocpUE4ed4uDwb9wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:44.121609 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:56078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIGNSswJuvopo3lOiJiQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:45.320998 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:56042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIGdSswJuvopo3lOiJiwAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:46:43.873192 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:57844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIU1ajLEzk2WiQ-1063AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:46:47.443684 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIV0r9dMAiw-8KANNwJQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:47:16.949778 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:53638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiIdI6lpbStxTqkSkuPRgAAAlM"]
[Mon Mar 16 19:47:37.108390 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:58472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIiaTCbgAP5jq5TehTBAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:47:44.726304 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:52372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIkFajLEzk2WiQ-1068AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:47:52.494062 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:52376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiImP9ocpUE4ed4uDwcRwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:47:53.810470 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:55896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiImaQpVkWug9HeOt9abQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:48:31.199638 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:33310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIv7ysWC90G-1nBrBtsQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:48:34.675412 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:34514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIwqQpVkWug9HeOt9afwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:48:37.096412 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIxbABkC4fWIHEf8EhrwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:00.644231 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:50968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJVP9ocpUE4ed4uDwc3QAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:50.035015 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:59406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJhv9ocpUE4ed4uDwc-wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:55.495040 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:53640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJi46lpbStxTqkSkuPuAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:52:23.060244 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.228.16:52234] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiJp6TCbgAP5jq5TehTOgAAAsk"]
[Mon Mar 16 19:55:18.864222 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.244.31:50326] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiKVkr9dMAiw-8KANNxAwAAAQA"]
[Mon Mar 16 19:57:51.260639 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.228.16:39944] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiK76QpVkWug9HeOt9bEAAAA08"]
[Mon Mar 16 20:00:24.135509 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44224] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiLiNSswJuvopo3lOiK2QAAAIU"]
[Mon Mar 16 20:03:00.530803 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.228.16:60100] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiMJLABkC4fWIHEf8EjLAAAAFY"]
[Mon Mar 16 20:05:46.979191 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.244.31:40938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiMys_BxrYCr4hPDw8V-QAAAco"]
[Mon Mar 16 20:08:15.975891 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.228.16:49562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiNX7ABkC4fWIHEf8Ej-QAAAFQ"]
[Mon Mar 16 20:10:52.814849 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:33356] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiN_I6lpbStxTqkSkuREAAAAkw"]
[Mon Mar 16 20:13:25.317186 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.228.16:51688] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiOk1ajLEzk2WiQ-1081wAAAok"]
[Mon Mar 16 20:15:52.925355 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.244.31:42448] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiPKI6lpbStxTqkSkuRZwAAAlc"]
[Mon Mar 16 20:20:53.137478 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.244.31:50916] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiQVUr9dMAiw-8KANNyjQAAARc"]
[Mon Mar 16 20:29:17.706870 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.228.16:58010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiSTaQpVkWug9HeOt9dCgAAA0Q"]
[Mon Mar 16 20:31:11.692967 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:48716] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiSv46lpbStxTqkSkuR4QAAAlI"]
[Mon Mar 16 20:34:26.335882 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.228.16:32864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiTgkr9dMAiw-8KANNzTQAAARQ"]
[Mon Mar 16 20:36:14.121975 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.244.31:36736] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiT7kr9dMAiw-8KANNzYQAAARU"]
[Mon Mar 16 20:39:58.076079 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.228.16:34738] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiUzo6lpbStxTqkSkuSJwAAAkg"]
[Mon Mar 16 20:41:14.755265 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.244.31:41326] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiVGrysWC90G-1nBrBwlgAAAZc"]
[Mon Mar 16 20:45:07.043815 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.228.16:48566] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiWA6TCbgAP5jq5TehWpgAAAsg"]
[Mon Mar 16 20:46:18.890655 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.244.31:52850] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiWSrysWC90G-1nBrBxLAAAAZQ"]
[Mon Mar 16 20:50:28.487307 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.228.16:48416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiXRKTCbgAP5jq5TehW-gAAAtU"]
[Mon Mar 16 20:55:31.273524 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.228.16:38954] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiYc8_BxrYCr4hPDw8YwwAAAck"]
[Mon Mar 16 20:56:23.920087 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:35808] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiYp9SswJuvopo3lOiOggAAAJg"]
[Mon Mar 16 21:00:52.871359 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:33016] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiZtLABkC4fWIHEf8EphwAAAE8"]
[Mon Mar 16 21:01:32.470350 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.244.31:47538] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiZ3FajLEzk2WiQ-11A3AAAApU"]
[Mon Mar 16 21:06:01.935021 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.228.16:44842] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abia6bysWC90G-1nBrByFwAAAY0"]
[Mon Mar 16 21:06:43.691783 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:48660] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abibE7ABkC4fWIHEf8Ep6QAAAEI"]
[Mon Mar 16 21:11:26.487429 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.228.16:41526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abicLtSswJuvopo3lOiPYQAAAJA"]
[Mon Mar 16 21:11:47.950679 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.244.31:47952] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abicQ_9ocpUE4ed4uDwiKwAAAgk"]
[Mon Mar 16 21:16:29.345241 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.228.16:59730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abidXUr9dMAiw-8KANN2fgAAAQQ"]
[Mon Mar 16 21:16:48.866883 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.244.31:43950] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abidcM_BxrYCr4hPDw8ZzQAAAcs"]
[Mon Mar 16 21:21:56.422916 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.244.31:39664] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiepKTCbgAP5jq5TehZMgAAAtE"]
[Mon Mar 16 21:32:13.827480 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.228.16:48248] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abihDVajLEzk2WiQ-11DRAAAAo0"]
[Mon Mar 16 21:32:40.362831 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.244.31:40634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abihKEr9dMAiw-8KANN3mgAAAQc"]
[Mon Mar 16 21:37:17.600297 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.228.16:35062] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiiPf9ocpUE4ed4uDwjVAAAAgA"]
[Mon Mar 16 21:37:43.669132 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:47068] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiiV7ABkC4fWIHEf8Er7QAAAFY"]
[Mon Mar 16 21:42:38.467225 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.228.16:40656] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abijftSswJuvopo3lOiQzAAAAJU"]
[Mon Mar 16 21:43:00.979113 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.244.31:34486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abijlKQpVkWug9HeOt9gxgAAA0k"]
[Mon Mar 16 21:47:50.807549 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:42796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abikto6lpbStxTqkSkuVygAAAlQ"]
[Mon Mar 16 21:48:16.098445 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.244.31:35522] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abik0KTCbgAP5jq5Teha2AAAAtQ"]
[Mon Mar 16 21:53:05.214654 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.228.16:42800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abil8f9ocpUE4ed4uDwkvQAAAhY"]
[Mon Mar 16 21:54:41.369594 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:50732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abimUY6lpbStxTqkSkuWcQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 21:55:23.146652 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:40086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abime6TCbgAP5jq5TehbLgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 21:58:27.990224 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.228.16:48730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abinM7ABkC4fWIHEf8EtmgAAAFI"]
[Mon Mar 16 21:58:43.170508 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.244.31:37084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abinQ_9ocpUE4ed4uDwlYQAAAgA"]
[Mon Mar 16 21:59:58.904717 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abinjqQpVkWug9HeOt9ifAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:01:17.946159 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:35022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abin3bysWC90G-1nBrB1NgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:16.811211 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:38058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioVI6lpbStxTqkSkuXkAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:20.234500 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:42760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioWFajLEzk2WiQ-11FGwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:21.522883 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:42766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioWc_BxrYCr4hPDw8cVwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:23.751369 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioW_9ocpUE4ed4uDwmRQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:27.158195 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:42774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioX6QpVkWug9HeOt9izAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:27.532772 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.228.16:41054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abioX0r9dMAiw-8KANN6tAAAAQw"]
[Mon Mar 16 22:03:42.373449 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:42754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiobkr9dMAiw-8KANN6wwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:42.658944 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.244.31:36608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiobqTCbgAP5jq5TehcjAAAAtc"]
[Mon Mar 16 22:03:44.042462 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:59792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiocLysWC90G-1nBrB1ZAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:47.514646 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:59712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioc7ABkC4fWIHEf8EuaAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:48.817115 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:39670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiodNSswJuvopo3lOiSvQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:54.527112 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:39678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioerysWC90G-1nBrB1cwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:55.855319 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:39690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioe46lpbStxTqkSkuXnAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:59.888687 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:39706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiof46lpbStxTqkSkuXoAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:04:01.231589 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:54062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiogbABkC4fWIHEf8EucQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:06:06.156889 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:34090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abio_kr9dMAiw-8KANN7DgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:07.475079 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:49354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abio_7ABkC4fWIHEf8EurwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:08.807413 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:49368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipAKQpVkWug9HeOt9i9wAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:11.213048 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:43106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipA8_BxrYCr4hPDw8ckgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:13.615391 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:43122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipBaQpVkWug9HeOt9i-gAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:59.802690 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:49218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipM0r9dMAiw-8KANN7QwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:03.686137 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:49218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipN0r9dMAiw-8KANN7RwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:40.583454 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:43124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXP9ocpUE4ed4uDwnMgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:41.166763 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:59004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXaQpVkWug9HeOt9jKQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:41.882983 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXbABkC4fWIHEf8Eu0wAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:42.060200 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXrABkC4fWIHEf8Eu1AAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:43.443453 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:52128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipX6TCbgAP5jq5TehdFAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:44.615790 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:51042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYFajLEzk2WiQ-11FcQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:44.749395 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:52144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYKQpVkWug9HeOt9jLAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:45.916062 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:52154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYbABkC4fWIHEf8Eu1gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:49.691069 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:51046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipZaTCbgAP5jq5TehdHgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:52.806857 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:52164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipaEr9dMAiw-8KANN7XAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:53.135430 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:41072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipadSswJuvopo3lOiTZQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:54.168018 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:59104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipakr9dMAiw-8KANN7XQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:55.782724 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:59106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipa8_BxrYCr4hPDw8crwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:58.188586 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:59110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipbtSswJuvopo3lOiTZwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:00.657623 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipb_9ocpUE4ed4uDwnOQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:08:02.918246 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:58462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipco6lpbStxTqkSkuX4gAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:03.068788 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:59122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipc9SswJuvopo3lOiTbgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:04.114411 2026] [core:alert] [pid 10831:tid 140411674785536] [client 74.7.241.46:58472] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/sys
[Mon Mar 16 22:08:06.919761 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:58476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipdY6lpbStxTqkSkuX6AAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:10.312362 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipeo6lpbStxTqkSkuX7AAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:11.596467 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:51254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipe0r9dMAiw-8KANN7YgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:12.794941 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:51258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipfFajLEzk2WiQ-11FeAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:15.151565 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:51264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipf9SswJuvopo3lOiTcgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:17.503827 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:51278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipgbABkC4fWIHEf8Eu5wAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:19.096087 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:51278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipg7ABkC4fWIHEf8Eu6wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:21.603100 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:43986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiphbABkC4fWIHEf8Eu7gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:22.902874 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:43994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiphtSswJuvopo3lOiTdgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:25.259712 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:43996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipif9ocpUE4ed4uDwnRwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:26.502322 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:44002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipitSswJuvopo3lOiTegAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:27.650858 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:44008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipi6TCbgAP5jq5TehdRwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:28.993279 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.243.203:44024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipjM_BxrYCr4hPDw8cuwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:29.371520 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.228.16:60706] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abipjf9ocpUE4ed4uDwnSwAAAhE"]
[Mon Mar 16 22:08:30.315111 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:34796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipjs_BxrYCr4hPDw8cvQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:32.551004 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipkFajLEzk2WiQ-11FhQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:33.983067 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:51936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipkc_BxrYCr4hPDw8cvgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:35.006506 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:34812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipk6TCbgAP5jq5TehdTAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:37.855281 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:34818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipldSswJuvopo3lOiTggAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:38.863244 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:51940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiplkr9dMAiw-8KANN7cgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:40.315535 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:34830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipmM_BxrYCr4hPDw8cwwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:41.707130 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:40662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipmaTCbgAP5jq5TehdTQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:44.373694 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:51452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abipnNSswJuvopo3lOiTgwAAAIE"]
[Mon Mar 16 22:09:33.593799 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:40666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipzbysWC90G-1nBrB2dQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:09:39.297861 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:40666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip07ysWC90G-1nBrB2ewAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:41.726819 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.243.203:37302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip1c_BxrYCr4hPDw8c3AAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:44.232760 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:37310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip2M_BxrYCr4hPDw8c3gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:46.023030 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:37324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip2s_BxrYCr4hPDw8c3wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:56.121325 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:37332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip5I6lpbStxTqkSkuYEAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:58.091214 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:37332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip5I6lpbStxTqkSkuYEQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:59.451998 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:51984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip59SswJuvopo3lOiTlgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:01.951130 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:34372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip6f9ocpUE4ed4uDwnmQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:02.423482 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:34372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip6v9ocpUE4ed4uDwnmgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:03.086950 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:36882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip60r9dMAiw-8KANN7jwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:04.015087 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:36882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7Er9dMAiw-8KANN7kAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:06.313437 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:36892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7dSswJuvopo3lOiTmgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:06.343883 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:40726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7bysWC90G-1nBrB2hgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:09.117771 2026] [proxy_fcgi:error] [pid 29802:tid 140411590858496] (70007)The timeout specified has expired: [client 45.227.253.15:54744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:15.579267 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:46966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip97ABkC4fWIHEf8EvIQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:17.012568 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:46976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip-bABkC4fWIHEf8EvIgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:19.864926 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:45772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip-6QpVkWug9HeOt9jmQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:20.547517 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:36202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_P9ocpUE4ed4uDwnoQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:21.486231 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:45778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_bABkC4fWIHEf8EvJgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:22.145217 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:39004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_v9ocpUE4ed4uDwnpgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:22.775152 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_v9ocpUE4ed4uDwnqAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:23.589315 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:39018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip__9ocpUE4ed4uDwnqQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:25.466555 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:45798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAdSswJuvopo3lOiToAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:25.976197 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:39032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAaQpVkWug9HeOt9jpQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:26.770973 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAv9ocpUE4ed4uDwnqwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:28.031214 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:59994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqBM_BxrYCr4hPDw8c7QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:29.722958 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:60002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqBaQpVkWug9HeOt9jsgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:31.145772 2026] [proxy_fcgi:error] [pid 15061:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44354] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:52.081899 2026] [proxy_fcgi:error] [pid 29507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:53.099717 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:39034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqHaQpVkWug9HeOt9jzAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:54.130751 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:60946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqHkr9dMAiw-8KANN7pAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:13.137857 2026] [proxy_fcgi:error] [pid 29507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:15.529767 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqM9SswJuvopo3lOiTrwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:34.130170 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:36.081603 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSKTCbgAP5jq5TehdcAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:36.749504 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSM_BxrYCr4hPDw8dAAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:37.236689 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSc_BxrYCr4hPDw8dAQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:37.827397 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:55296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSUr9dMAiw-8KANN7qwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:54.835230 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:41106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqWs_BxrYCr4hPDw8dBAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:55.154316 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:56.138411 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:41108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXLysWC90G-1nBrB2mQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:56.670234 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:37850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXEr9dMAiw-8KANN7rgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:57.663596 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:41114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXY6lpbStxTqkSkuYMwAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:58.854032 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:59338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXqQpVkWug9HeOt9j0wAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:00.039561 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:59342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqYLABkC4fWIHEf8EvPwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:16.417813 2026] [proxy_fcgi:error] [pid 15061:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:12:18.185166 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:42494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqcv9ocpUE4ed4uDwn_QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:19.259828 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:37852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqc46lpbStxTqkSkuYOgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:19.446571 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:42498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqc_9ocpUE4ed4uDwoAAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:21.787422 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:56208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqdY6lpbStxTqkSkuYPgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:38.121882 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47694] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:12:40.331416 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqiP9ocpUE4ed4uDwoFQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:40.331439 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:42514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqiNSswJuvopo3lOiTtgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:41.635289 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqidSswJuvopo3lOiTtwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:42.378875 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:57544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqilajLEzk2WiQ-11FvQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:43.675343 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:57556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqi6QpVkWug9HeOt9j1wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:59.121830 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48176] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:01.283073 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:58856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqndSswJuvopo3lOiTuwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:02.459550 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:58860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqntSswJuvopo3lOiTvAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:03.286301 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:54838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqn6TCbgAP5jq5TehdfgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:03.992678 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:58866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqn9SswJuvopo3lOiTvgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:05.235997 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:58880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqoaQpVkWug9HeOt9j2QAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:20.057974 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:22.408529 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqsbysWC90G-1nBrB2owAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:22.413306 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:37018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqsUr9dMAiw-8KANN7vAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:23.722500 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:49280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqs0r9dMAiw-8KANN7vwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:25.147024 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:49288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqtbABkC4fWIHEf8EvTgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:27.087499 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:58428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqt8_BxrYCr4hPDw8dEQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:31.963454 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:40950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiquo6lpbStxTqkSkuYTwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:31.964051 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:49290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqu7ABkC4fWIHEf8EvVQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:31.965061 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:52360] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiqu9SswJuvopo3lOiTwwAAAJI"]
[Mon Mar 16 22:13:33.999747 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:34646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqvVajLEzk2WiQ-11FwwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:36.774871 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:34650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqwLysWC90G-1nBrB2pwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:38.367536 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:43648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqwkr9dMAiw-8KANN7wAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:41.153782 2026] [proxy_fcgi:error] [pid 10651:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49288] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:42.471410 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:43650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqxs_BxrYCr4hPDw8dFgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:43.192377 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:40962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqx6TCbgAP5jq5TehdjgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:44.095663 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:43656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyLABkC4fWIHEf8EvVgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:46.000870 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:34856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyUr9dMAiw-8KANN7wgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:46.031936 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.244.31:35622] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiqyo6lpbStxTqkSkuYUQAAAkg"]
[Mon Mar 16 22:13:46.885339 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:43670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyqTCbgAP5jq5TehdkQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:49.702517 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:55336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqzY6lpbStxTqkSkuYUwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:02.129940 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:02.369777 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:55336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq2o6lpbStxTqkSkuYVwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:04.233800 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:50082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq3NSswJuvopo3lOiTyQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:04.643109 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:34872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq3FajLEzk2WiQ-11FzAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:08.303654 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:50086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq4KTCbgAP5jq5TehdlwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:08.947915 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq4Er9dMAiw-8KANN7xgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:11.045097 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:50738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq46QpVkWug9HeOt9j5gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:23.045904 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50452] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:25.696654 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:54300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq8Y6lpbStxTqkSkuYWwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:26.271840 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:37454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq8s_BxrYCr4hPDw8dHgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:27.201091 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:54300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq846lpbStxTqkSkuYXgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:28.925478 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:51620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq9LysWC90G-1nBrB2rwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:29.401822 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:53846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq9bysWC90G-1nBrB2sAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:31.103773 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.243.203:60148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq98_BxrYCr4hPDw8dIAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:44.061426 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:44.258598 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:51626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirBEr9dMAiw-8KANN70AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:48.071262 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:60156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirCFajLEzk2WiQ-11F1QAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:51.663823 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirC6TCbgAP5jq5TehdoAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:53.364097 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:56620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirDdSswJuvopo3lOiTzgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:03.002542 2026] [log_config:warn] [pid 21806:tid 140411658000128] (32)Broken pipe: [client 69.197.179.242:44182] AH00646: Error writing to |/etc/httpd/logger, referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Mon Mar 16 22:15:03.340066 2026] [ssl:warn] [pid 6229:tid 140412349433728] AH01909: bandeirantesbomb3.hospedagemdesites.ws:443:0 server certificate does NOT include an ID which matches the server name
[Mon Mar 16 22:15:05.846624 2026] [log_config:warn] [pid 15061:tid 140411658000128] (32)Broken pipe: [client 74.7.241.46:56636] AH00646: Error writing to |/etc/httpd/logger, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Mon Mar 16 22:15:06.357876 2026] [proxy_fcgi:error] [pid 15061:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51610] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:06.358192 2026] [log_config:warn] [pid 15061:tid 140411548894976] (32)Broken pipe: [client 179.188.53.243:51610] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:06.550180 2026] [log_config:warn] [pid 29802:tid 140411699963648] (32)Broken pipe: [client 74.7.243.203:59840] AH00646: Error writing to |/etc/httpd/logger, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt
[Mon Mar 16 22:15:07.575824 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:55426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirGwQohV2v-7oj5HG81AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:08.846745 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:42726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirHAQohV2v-7oj5HG81gAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:15:18.763378 2026] [:error] [pid 2305:tid 140411691570944] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirJgQohV2v-7oj5HG84AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:28.000695 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:43446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirL6BJNF7axNlVR0W6WwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:15:28.057834 2026] [proxy_fcgi:error] [pid 10831:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52352] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:28.058135 2026] [log_config:warn] [pid 10831:tid 140411741927168] (32)Broken pipe: [client 179.188.53.243:52352] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:28.789001 2026] [:error] [pid 2304:tid 140411725141760] [client 74.7.243.203:44870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirMMh3JZxwdBQwPYGyVQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:30.463254 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:34448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirMu82sZHvlq4xgHqAsQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:31.763453 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:34460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirM6BJNF7axNlVR0W6XgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:33.426883 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:34462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirNaBJNF7axNlVR0W6YAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:33.627435 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:34462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirNaBJNF7axNlVR0W6YQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:37.626028 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:34468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirOQQohV2v-7oj5HG87QAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:51.125789 2026] [proxy_fcgi:error] [pid 29802:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52904] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:51.126066 2026] [log_config:warn] [pid 29802:tid 140411590858496] (32)Broken pipe: [client 179.188.53.243:52904] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:52.189396 2026] [:error] [pid 2304:tid 140411607643904] [client 74.7.243.203:34476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirSMh3JZxwdBQwPYGydQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:56.631453 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:53922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTO82sZHvlq4xgHqAuwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:57.370880 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.241.46:55970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTch3JZxwdBQwPYGyfgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:59.531712 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:53926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTwQohV2v-7oj5HG88QAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:01.260823 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:54788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirUaBJNF7axNlVR0W6dAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:02.729894 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:54804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirUqBJNF7axNlVR0W6eAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:15.129866 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:15.130123 2026] [log_config:warn] [pid 10831:tid 140411725141760] (32)Broken pipe: [client 179.188.53.243:53362] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:19.417010 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:56756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirY6BJNF7axNlVR0W6hQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:24.867803 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:36936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiraO82sZHvlq4xgHqAxwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:37.123378 2026] [proxy_fcgi:error] [pid 15568:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:37.123600 2026] [log_config:warn] [pid 15568:tid 140411599251200] (32)Broken pipe: [client 179.188.53.243:53622] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:40.812186 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.243.203:34108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abireMh3JZxwdBQwPYGyqAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:42.624229 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.243.203:35406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiregQohV2v-7oj5HG9CQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:44.126987 2026] [:error] [pid 2304:tid 140411557287680] [client 74.7.243.203:35420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirfMh3JZxwdBQwPYGyrQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:46.780955 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:35428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirfqBJNF7axNlVR0W6lgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:54.567129 2026] [mime_magic:error] [pid 2473:tid 140411741927168] (70014)End of file found: [client 74.7.241.46:59550] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/systemd/system
[Mon Mar 16 22:16:55.560034 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:38820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirhwQohV2v-7oj5HG9EAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:59.057834 2026] [proxy_fcgi:error] [pid 10831:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53874] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:59.058178 2026] [log_config:warn] [pid 10831:tid 140411708356352] (32)Broken pipe: [client 179.188.53.243:53874] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:59.522553 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:38826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiri-82sZHvlq4xgHqBCQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:08.704279 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:36490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirlKBJNF7axNlVR0W6qQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:21.033864 2026] [proxy_fcgi:error] [pid 10831:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54080] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:17:21.034171 2026] [log_config:warn] [pid 10831:tid 140411632822016] (32)Broken pipe: [client 179.188.53.243:54080] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:17:22.341624 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:36092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiroqBJNF7axNlVR0W6rgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:24.802733 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:36096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirpKBJNF7axNlVR0W6sAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:26.227269 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:36102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirpsh3JZxwdBQwPYGy0wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:27.688840 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:36118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirp6BJNF7axNlVR0W6swAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:29.122963 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:36122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirqe82sZHvlq4xgHqBJgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:43.121836 2026] [proxy_fcgi:error] [pid 29507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54264] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:17:43.122148 2026] [log_config:warn] [pid 29507:tid 140411649607424] (32)Broken pipe: [client 179.188.53.243:54264] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:17:44.233638 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:48620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiruKBJNF7axNlVR0W6vQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:05.105845 2026] [proxy_fcgi:error] [pid 29802:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:05.106168 2026] [log_config:warn] [pid 29802:tid 140411548894976] (32)Broken pipe: [client 179.188.53.243:54478] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:06.911611 2026] [:error] [pid 2304:tid 140411632822016] [client 74.7.243.203:59520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirzsh3JZxwdBQwPYGy6AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:09.642975 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.243.203:38014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir0QQohV2v-7oj5HG9PAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:10.867534 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir0u82sZHvlq4xgHqBUgAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:12.199784 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:53044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir1Mh3JZxwdBQwPYGy7gAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:16.348472 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:53052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir2Mh3JZxwdBQwPYGy8gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:27.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54732] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:27.126103 2026] [log_config:warn] [pid 21805:tid 140411607643904] (32)Broken pipe: [client 179.188.53.243:54732] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:28.210883 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:43472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir5O82sZHvlq4xgHqBZQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:29.192818 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:49002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir5aBJNF7axNlVR0W62AAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:31.611169 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:56208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir56BJNF7axNlVR0W62wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:32.412962 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.228.16:43416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abir6KBJNF7axNlVR0W63gAAAAA"]
[Mon Mar 16 22:18:37.480281 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:56210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir7aBJNF7axNlVR0W66QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:40.203741 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:56226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir8AQohV2v-7oj5HG9SQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:44.919599 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.244.31:37992] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abir9O82sZHvlq4xgHqBdAAAApc"]
[Mon Mar 16 22:18:47.550985 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:50616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir96BJNF7axNlVR0W69gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:49.065801 2026] [proxy_fcgi:error] [pid 15568:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54966] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:49.066057 2026] [log_config:warn] [pid 15568:tid 140411658000128] (32)Broken pipe: [client 179.188.53.243:54966] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:53.041245 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:50622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir_aBJNF7axNlVR0W6-wAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:58.308864 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:34454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisAgQohV2v-7oj5HG9UwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:11.106089 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:11.106416 2026] [log_config:warn] [pid 21805:tid 140411708356352] (32)Broken pipe: [client 179.188.53.243:55208] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:18.449644 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:59778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisFsh3JZxwdBQwPYGy_gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:33.131031 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55380] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:33.131363 2026] [log_config:warn] [pid 10772:tid 140411574073088] (32)Broken pipe: [client 179.188.53.243:55380] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:40.316782 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:59778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisLMh3JZxwdBQwPYGzDgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:42.915046 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.243.203:46366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisLsh3JZxwdBQwPYGzFAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:19:55.401831 2026] [proxy_fcgi:error] [pid 29507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:55.402177 2026] [log_config:warn] [pid 29507:tid 140411658000128] (32)Broken pipe: [client 179.188.53.243:55608] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:56.408577 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisPAQohV2v-7oj5HG9ZQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:20:17.777919 2026] [core:alert] [pid 2473:tid 140411565680384] [client 74.7.241.46:42460] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Mon Mar 16 22:20:18.121800 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55844] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:20:39.126221 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56166] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:02.129815 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56434] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:24.077875 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56652] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:46.126619 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:08.121784 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:31.125961 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57292] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:53.066969 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57588] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:54.163421 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:34566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abis7u82sZHvlq4xgHqCgQAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:22:56.930175 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:54014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abis8O82sZHvlq4xgHqChAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:23:15.125803 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57794] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:23:17.221566 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.241.46:55708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitBO82sZHvlq4xgHqCiwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:19.456858 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:50860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitBwQohV2v-7oj5HG9sgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:20.939393 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:50870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitCO82sZHvlq4xgHqCjQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:22.185583 2026] [:error] [pid 4740:tid 140411632822016] [client 74.7.241.46:50874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitCgfYLcKp6Sb5AeL1nQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:23.838048 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.241.46:50884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitC8h3JZxwdBQwPYGzZQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:34.779366 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:33058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitFgQohV2v-7oj5HG9vgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:36.312337 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.241.46:33074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitGAQohV2v-7oj5HG9vwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:37.125814 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57992] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:23:37.749051 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.241.46:33078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitGQfYLcKp6Sb5AeL1pgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:40.516256 2026] [:error] [pid 4740:tid 140411691570944] [client 74.7.241.46:37642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHAfYLcKp6Sb5AeL1qAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:40.983887 2026] [:error] [pid 2304:tid 140411666392832] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHMh3JZxwdBQwPYGzcAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:23:41.835210 2026] [:error] [pid 4740:tid 140411649607424] [client 74.7.241.46:37650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHQfYLcKp6Sb5AeL1qgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:42.339884 2026] [:error] [pid 4740:tid 140411616036608] [client 74.7.241.46:37650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHgfYLcKp6Sb5AeL1rAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:44.445773 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:55676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitIKBJNF7axNlVR0W75AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:23:44.445970 2026] [:error] [pid 4740:tid 140411624429312] [client 74.7.241.46:37662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHwfYLcKp6Sb5AeL1rgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:45.749359 2026] [:error] [pid 4740:tid 140411607643904] [client 74.7.244.31:47226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abitIQfYLcKp6Sb5AeL1rwAAAFA"]
[Mon Mar 16 22:23:46.434792 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:37666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitIu82sZHvlq4xgHqCkwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:58.121810 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:00.219349 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMMh3JZxwdBQwPYGzeQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:01.618658 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:45500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMQQohV2v-7oj5HG9yQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:01.898334 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:45500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMQQohV2v-7oj5HG9ygAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:03.432438 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:45506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitM6BJNF7axNlVR0W77QAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:04.806155 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.241.46:45510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitNMh3JZxwdBQwPYGzfQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:06.228756 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:45520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitNu82sZHvlq4xgHqCqgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:07.681201 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:45534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitN6BJNF7axNlVR0W78QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:18.855153 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:48276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitQgQohV2v-7oj5HG91wAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:20.057869 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:21.371035 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:48282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitRQQohV2v-7oj5HG93QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:24.773624 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:48292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitRwQohV2v-7oj5HG93wAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:26.793641 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:48306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitSqBJNF7axNlVR0W7-gAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:29.445786 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:49444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitTe82sZHvlq4xgHqCwAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:29.913494 2026] [:error] [pid 2304:tid 140411540502272] [client 74.7.243.203:55692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitTch3JZxwdBQwPYGzkwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:31.573437 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:51770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitT6BJNF7axNlVR0W8AQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:42.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:43.253356 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.241.46:49456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitW8h3JZxwdBQwPYGzmQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:46.264535 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:46350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitXqBJNF7axNlVR0W8CwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:46.769232 2026] [:error] [pid 2304:tid 140411649607424] [client 74.7.243.203:44870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitXsh3JZxwdBQwPYGzmwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:48.745099 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:55970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYKBJNF7axNlVR0W8DwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:50.028164 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.241.46:55976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYgQohV2v-7oj5HG97wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:50.099443 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.243.203:50982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYsh3JZxwdBQwPYGzngAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:53.211474 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:50998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitZaBJNF7axNlVR0W8EgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:04.137830 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58848] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:25:05.195877 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.241.46:55982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitcQQohV2v-7oj5HG98wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:09.876279 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:47798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitdaBJNF7axNlVR0W8HAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:11.195209 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.241.46:47808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitd8h3JZxwdBQwPYGz1QAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:11.727695 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:33138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitd6BJNF7axNlVR0W8HgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:12.636147 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:47824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiteAQohV2v-7oj5HG99AAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:18.339810 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:47826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitfu82sZHvlq4xgHqC7wAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:25:20.637264 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:33138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgKBJNF7axNlVR0W8JgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:21.275465 2026] [:error] [pid 2304:tid 140411649607424] [client 74.7.241.46:54930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgch3JZxwdBQwPYGz2AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:22.954845 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:54942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgqBJNF7axNlVR0W8JwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:25.796416 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:59792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abithe82sZHvlq4xgHqC-AAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:26.132739 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:25:27.959589 2026] [:error] [pid 2304:tid 140411658000128] [client 74.7.241.46:54956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abith8h3JZxwdBQwPYGz3AAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:25:29.966746 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.243.203:59796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitiQQohV2v-7oj5HG9-wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:48.125827 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:11.123265 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59452] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:15.167791 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.241.46:33762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitt8h3JZxwdBQwPYGz_gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:26:33.125980 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:55.133785 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59858] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:02.681671 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:57504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit5gQohV2v-7oj5HG-HQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:04.568154 2026] [:error] [pid 2304:tid 140411607643904] [client 74.7.241.46:57502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit6Mh3JZxwdBQwPYG0EwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:17.128676 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:21.366841 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.241.46:57510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit-ch3JZxwdBQwPYG0IAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:39.103933 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60224] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:43.805055 2026] [:error] [pid 4740:tid 140411574073088] [client 74.7.241.46:53922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuDwfYLcKp6Sb5AeL2AwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:45.627500 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuEQQohV2v-7oj5HG-JQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:48.325048 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:44504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuFO82sZHvlq4xgHqDOQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:50.072299 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.241.46:35058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuFgfYLcKp6Sb5AeL2BQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:01.125806 2026] [proxy_fcgi:error] [pid 4740:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:28:02.238722 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:35064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuIgQohV2v-7oj5HG-KQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:05.304409 2026] [:error] [pid 2304:tid 140411699963648] [client 74.7.241.46:44028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuJch3JZxwdBQwPYG0PgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:07.936109 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.241.46:44044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuJ-82sZHvlq4xgHqDQAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:08.643322 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.243.203:58484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKMh3JZxwdBQwPYG0RQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:28:09.699368 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:50542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKQQohV2v-7oj5HG-KwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:10.976807 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:50544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKqBJNF7axNlVR0W8pAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:14.849405 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:50558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuLgQohV2v-7oj5HG-LgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:23.129827 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:28:33.612614 2026] [:error] [pid 4740:tid 140411565680384] [client 74.7.241.46:53972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuQQfYLcKp6Sb5AeL2GQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:35.260323 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:41662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuQ6BJNF7axNlVR0W8rwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:41.827718 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:41676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuSe82sZHvlq4xgHqDXQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:43.282887 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:55524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuS-82sZHvlq4xgHqDXwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:44.555765 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:55536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuTKBJNF7axNlVR0W8uAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:45.131881 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:07.125822 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32866] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:30.141871 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33088] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:52.137786 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33330] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:56.699948 2026] [:error] [pid 4740:tid 140411632822016] [client 74.7.241.46:55538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiulAfYLcKp6Sb5AeL2VAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:29:58.441699 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:45926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiulqBJNF7axNlVR0W82wAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:14.137333 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:30:16.044896 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.46:45938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuqKBJNF7axNlVR0W86QAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:26.347172 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:45938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiusqBJNF7axNlVR0W88AAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:27.084496 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:36326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abius-82sZHvlq4xgHqDpgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:30:36.088481 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:30:48.341340 2026] [:error] [pid 2304:tid 140411708356352] [client 74.7.241.46:42946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuyMh3JZxwdBQwPYG01wAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:55.223983 2026] [core:alert] [pid 4740:tid 140411590858496] [client 66.249.74.169:45946] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 22:30:58.125864 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33960] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:31:01.371780 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:42448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiu1e82sZHvlq4xgHqDuQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:31:02.716688 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.241.46:42450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiu1u82sZHvlq4xgHqDvAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:31:21.139865 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34178] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:31:43.122089 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:00.841656 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:42466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivEAQohV2v-7oj5HG-jAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:32:05.125919 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34582] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:11.984184 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:48772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivG-82sZHvlq4xgHqD-AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:17.674996 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.243.203:50728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivIch3JZxwdBQwPYG0_wAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:27.126034 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:34.327572 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.243.203:59120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivMgQohV2v-7oj5HG-mwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:51.121954 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:56.909412 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:40950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivSKBJNF7axNlVR0W9NwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:59.545417 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:56926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivS-82sZHvlq4xgHqEDgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:00.892085 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.243.203:33484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivTAfYLcKp6Sb5AeL3BgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:13.054015 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:14.216314 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:33496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivWqBJNF7axNlVR0W9QwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:19.576249 2026] [:error] [pid 4740:tid 140411691570944] [client 74.7.243.203:44554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivXwfYLcKp6Sb5AeL3FwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:22.709834 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:52614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivYsh3JZxwdBQwPYG1KwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:35.137823 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:40.345655 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.228.16:35652] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abivdAfYLcKp6Sb5AeL3IwAAAFg"]
[Mon Mar 16 22:33:45.776439 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:52622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiveaBJNF7axNlVR0W9WgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:47.501497 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.243.203:34072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abive8h3JZxwdBQwPYG1QwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:33:56.129782 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35810] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:58.914141 2026] [:error] [pid 2304:tid 140411616036608] [client 74.7.244.31:60540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abivhsh3JZxwdBQwPYG1SwAAAI8"]
[Mon Mar 16 22:34:08.462954 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:42740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivkAQohV2v-7oj5HG_DgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:18.158326 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36084] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:34:19.421253 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:52578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivm-82sZHvlq4xgHqEWQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:23.034011 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:47152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivnwQohV2v-7oj5HG_IwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:24.300696 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.243.203:47162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivoAfYLcKp6Sb5AeL3RQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:27.405850 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:47164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivosh3JZxwdBQwPYG1VwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:40.121781 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36348] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:34:42.294742 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:47172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivsqBJNF7axNlVR0W9fgAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:35:02.689822 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36584] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:35:25.045822 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36810] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:35:47.116673 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37102] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:09.145272 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37392] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:32.069929 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:55.129849 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:37:17.114638 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:37:39.135590 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38552] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:02.129835 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38890] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:24.125933 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:46.133816 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39650] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:46.222766 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.228.16:37938] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiwpgQohV2v-7oj5HHAAQAAAZM"]
[Mon Mar 16 22:39:08.116063 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:39:08.744239 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.244.31:58606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiwvAQohV2v-7oj5HHAHAAAAZg"]
[Mon Mar 16 22:39:30.129799 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:39:58.139714 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40902] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:40:21.149832 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41280] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:40:42.125795 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:03.105818 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42242] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:24.132118 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42602] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:47.129793 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:08.574925 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:30.128162 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43782] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:51.125767 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44200] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:12.092580 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44504] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:34.129862 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44886] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:50.416160 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.228.16:44300] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abix1gQohV2v-7oj5HHBMQAAAYs"]
[Mon Mar 16 22:43:55.129811 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45252] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:16.129861 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:21.903358 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.244.31:33602] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abix9QQohV2v-7oj5HHBRgAAAYs"]
[Mon Mar 16 22:44:37.109582 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:58.069832 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:45:24.121772 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:45:45.130150 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:07.125774 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:29.145874 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:51.125800 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:12.129805 2026] [proxy_fcgi:error] [pid 11469:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:33.077927 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50202] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:55.102311 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:48:17.127427 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:48:39.169953 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:01.130475 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51652] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:11.983483 2026] [:error] [pid 4740:tid 140411565680384] [client 74.7.228.16:51450] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abizFwfYLcKp6Sb5AeL6JQAAAFU"]
[Mon Mar 16 22:49:23.122042 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52018] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:44.129779 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:05.149834 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:26.149778 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53136] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:26.305610 2026] [:error] [pid 2304:tid 140411708356352] [client 74.7.244.31:38852] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abizYsh3JZxwdBQwPYG3yAAAAIQ"]
[Mon Mar 16 22:50:29.817436 2026] [mime_magic:error] [pid 2304:tid 140411725141760] (70014)End of file found: [client 66.249.74.169:65001] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 22:50:48.121938 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:10.161778 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:33.110305 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:55.121828 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:16.121776 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55118] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:37.130121 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55540] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:59.045897 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:53:22.137900 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56196] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:53:44.123726 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:05.041995 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:12.504224 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:41282] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi0RJDEJR9VXonE_-0MQAAAAQ4"]
[Mon Mar 16 22:54:28.133987 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:50.045807 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57880] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:11.373779 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:33.132868 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58552] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:55.045855 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:56:16.053888 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:56:38.129325 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59700] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:01.129845 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:22.065887 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60332] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:43.057812 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:05.114518 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:26.129804 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:48.057845 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33654] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:09.125805 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:31.089841 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:36.397670 2026] [:error] [pid 2304:tid 140411557287680] [client 74.7.228.16:35514] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi1iMh3JZxwdBQwPYG4mwAAAJY"]
[Mon Mar 16 22:59:54.129815 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34706] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:16.102268 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35030] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:38.041906 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35216] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:45.110581 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.244.31:39252] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi1zQQohV2v-7oj5HHDVAAAAYg"]
[Mon Mar 16 23:00:59.125768 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35458] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:01:21.041896 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35690] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:01:43.102364 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35928] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:05.125819 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:27.118471 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:49.121902 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36496] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:11.125861 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36646] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:32.206603 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36842] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:55.025916 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37060] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:18.133832 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37176] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:39.145808 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:41.043884 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.228.16:52002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi2udCmCSWTlPouqoqNBgAAANE"]
[Mon Mar 16 23:05:00.157790 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:05:23.093827 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37620] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:05:45.130170 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37760] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:06.141900 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37950] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:08.340972 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:48002] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi3EMh3JZxwdBQwPYG5KwAAAJE"]
[Mon Mar 16 23:06:28.129833 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:49.131644 2026] [proxy_fcgi:error] [pid 4740:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38318] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:11.130604 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:33.123054 2026] [proxy_fcgi:error] [pid 2304:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38710] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:54.126051 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38978] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:16.126004 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:37.127453 2026] [proxy_fcgi:error] [pid 11469:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39440] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:58.126777 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:09:20.130361 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:09:43.064683 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:06.621814 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:08.218801 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:50634] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi4AJDEJR9VXonE_-0NogAAAQ4"]
[Mon Mar 16 23:10:28.141944 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:49.125823 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40660] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:11.117813 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:27.749424 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:42250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi4T6BJNF7axNlVR0XDYwAAABY"]
[Mon Mar 16 23:11:32.129795 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41102] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:54.049813 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:16.126646 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41596] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:37.125783 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:59.128680 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:13:21.117801 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:13:35.005023 2026] [core:alert] [pid 2305:tid 140411658000128] [client 66.249.74.160:35603] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 23:13:42.033829 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:03.057973 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42532] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:24.131431 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:46.134011 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42912] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:08.150790 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:19.217324 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:50298] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi5N9CmCSWTlPouqoqOegAAANM"]
[Mon Mar 16 23:15:30.127275 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:52.033967 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:13.141783 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:35.116670 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.244.31:58576] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi5g6BJNF7axNlVR0XECgAAAAQ"]
[Mon Mar 16 23:16:36.123313 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:58.139055 2026] [proxy_fcgi:error] [pid 4740:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44126] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:17:20.133783 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:17:42.137787 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44800] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:03.053829 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:25.121942 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:46.054200 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45722] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:08.129817 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45974] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:30.121861 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:52.132207 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:13.121816 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:35.131809 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46846] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:41.490129 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.228.16:46484] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi6ech3JZxwdBQwPYG6-gAAAIM"]
[Mon Mar 16 23:20:57.125870 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47010] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:18.133997 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47218] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:39.033841 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47466] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:55.627450 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.244.31:58282] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi6w-82sZHvlq4xgHqJlQAAAo0"]
[Mon Mar 16 23:22:00.041812 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:22:22.133400 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:22:43.121859 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:05.137788 2026] [proxy_fcgi:error] [pid 2304:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:26.134509 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:32.513683 2026] [mime_magic:error] [pid 2473:tid 140411691570944] (70014)End of file found: [client 66.249.74.169:51131] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:23:48.125806 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48670] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:07.655358 2026] [mime_magic:error] [pid 2473:tid 140411616036608] (70014)End of file found: [client 66.249.74.161:51544] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:24:09.126395 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:32.117809 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49110] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:54.069884 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:25:16.121819 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49636] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:25:38.130425 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49726] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:00.048902 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49918] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:22.121823 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50212] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:44.129947 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:00.230823 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:38568] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi79KBJNF7axNlVR0XEtwAAABY"]
[Mon Mar 16 23:27:05.325682 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50646] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:27.141772 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50854] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:50.037810 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51072] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:13.123056 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:34.129811 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:55.133811 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51706] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:16.121827 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:37.133799 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:58.108776 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52554] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:30:20.132444 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52886] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:30:42.129885 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53060] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:08.134743 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53250] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:30.037842 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53392] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:51.129963 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:59.404168 2026] [mime_magic:error] [pid 11469:tid 140411741927168] (70014)End of file found: [client 66.249.74.169:38391] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:32:12.073856 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:32:34.123249 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53990] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:32:55.073832 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54152] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:33:16.121785 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54246] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:33:39.124497 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54420] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:01.129791 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54680] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:23.131316 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:44.129779 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54976] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:05.121833 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:26.120054 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55366] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:47.137794 2026] [proxy_fcgi:error] [pid 2325:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55568] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:08.125894 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55734] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:11.463207 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.228.16:42062] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi-G5DEJR9VXonE_-0Q9QAAARI"]
[Mon Mar 16 23:36:31.121793 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55912] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:54.122892 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:15.106832 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:37.069833 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:37.252309 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.244.31:55732] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi-cZDEJR9VXonE_-0RBgAAARQ"]
[Mon Mar 16 23:37:59.125876 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:21.134256 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56874] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:43.122128 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57076] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:54.753346 2026] [mime_magic:error] [pid 4740:tid 140411674785536] (70014)End of file found: [client 66.249.74.160:60671] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/shop/pg/81establishment/30035
[Mon Mar 16 23:39:04.069839 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57290] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:39:26.133784 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:39:48.122602 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57692] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:10.105911 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57958] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:32.057814 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58098] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:53.139169 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58258] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:15.125844 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58422] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:32.014939 2026] [:error] [pid 2304:tid 140411666392832] [client 74.7.228.16:59378] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi_XMh3JZxwdBQwPYG8eQAAAIk"]
[Mon Mar 16 23:41:36.131722 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58550] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:58.121965 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:42:21.113626 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:42:43.155422 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:00.103123 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.31:54206] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi_tKBJNF7axNlVR0XFqwAAAAU"]
[Mon Mar 16 23:43:04.102018 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:26.065894 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:47.135027 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59756] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:08.127934 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59950] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:30.053886 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60094] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:30.388871 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] [client 103.214.142.103:55091] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/admin.php
[Mon Mar 16 23:44:51.121816 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60310] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:13.125824 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60530] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:34.125544 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60684] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:56.129793 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60900] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:17.131120 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32798] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:38.128644 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32972] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:42.487512 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.228.16:33796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjAkqBJNF7axNlVR0XF9QAAAAs"]
[Mon Mar 16 23:47:01.045840 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33162] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:47:22.145779 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33356] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:47:43.115280 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:03.561235 2026] [:error] [pid 4740:tid 140411590858496] [client 74.7.244.31:38508] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjA4wfYLcKp6Sb5AeL_eAAAAFI"]
[Mon Mar 16 23:48:05.109443 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:26.045876 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:47.133810 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:08.045975 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34382] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:30.125822 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:52.125802 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34828] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:14.129820 2026] [proxy_fcgi:error] [pid 11469:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:35.057876 2026] [proxy_fcgi:error] [pid 4740:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35186] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:56.121009 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:51:17.929808 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35558] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:51:40.611099 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:02.133864 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:14.440412 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.228.16:36766] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjB3tCmCSWTlPouqoqSbAAAANA"]
[Mon Mar 16 23:52:23.129819 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:44.129825 2026] [proxy_fcgi:error] [pid 11469:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:06.126655 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36400] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:23.173038 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.244.31:35008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjCI-82sZHvlq4xgHqLrgAAApU"]
[Mon Mar 16 23:53:27.033938 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:33.853916 2026] [access_compat:error] [pid 2325:tid 140411616036608] [client 38.127.61.169:28674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Mon Mar 16 23:53:48.046120 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36674] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:09.129828 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:31.121765 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:52.129858 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:13.139449 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37308] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:35.125806 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:56.137916 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:56:17.129797 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:56:38.126975 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38084] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:00.129904 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38186] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:16.629549 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.228.16:54886] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjDDKBJNF7axNlVR0XGyAAAABI"]
[Mon Mar 16 23:57:21.049834 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:45.125786 2026] [proxy_fcgi:error] [pid 4740:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:06.069856 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38714] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:29.133846 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:50.118883 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:11.042124 2026] [proxy_fcgi:error] [pid 2304:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39280] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:32.126656 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:53.129789 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:14.127252 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:36.333788 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:58.135363 2026] [proxy_fcgi:error] [pid 2305:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:01:19.099003 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:01:40.109817 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:01.082063 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:22.557832 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:37.284397 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.228.16:41312] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjETZDEJR9VXonE_-0TVAAAARU"]
[Tue Mar 17 00:02:44.122021 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:06.129839 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:27.057806 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:51.033805 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:12.126185 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41250] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:33.115828 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:52.927532 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.244.31:37100] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjE1O82sZHvlq4xgHqMRwAAAog"]
[Tue Mar 17 00:04:54.122239 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:16.237880 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:38.145834 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:59.132015 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:06:21.241844 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:06:43.145803 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:04.041852 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:25.125814 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:38.067228 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.228.16:34156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjFegQohV2v-7oj5HHIWAAAAZg"]
[Tue Mar 17 00:07:47.123912 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:08.129816 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:29.046214 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43352] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:51.133858 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:13.133808 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:35.135315 2026] [proxy_fcgi:error] [pid 2305:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:56.129772 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:10:12.602101 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.244.31:36070] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjGFJDEJR9VXonE_-0UGQAAARE"]
[Tue Mar 17 00:10:17.045799 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:10:39.131652 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:00.045853 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:21.113804 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:42.129925 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:12:05.130096 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:12:46.045816 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:05.627334 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.228.16:39790] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjGwZDEJR9VXonE_-0UVwAAAQY"]
[Tue Mar 17 00:13:07.033855 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:28.045944 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:49.117824 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:10.115386 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:32.081850 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:53.138153 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:14.125816 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:18.075240 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.244.31:48036] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjHRqBJNF7axNlVR0XIKwAAABE"]
[Tue Mar 17 00:15:35.129801 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:56.129882 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:16:17.125826 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:16:40.526804 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:02.048731 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:23.137815 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:44.133805 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:11.121794 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:11.878110 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.228.16:38892] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjH8-82sZHvlq4xgHqNEgAAAoY"]
[Tue Mar 17 00:18:32.074360 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:53.125779 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:14.125943 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:17.428157 2026] [access_compat:error] [pid 11469:tid 140411733534464] [client 38.127.61.169:59396] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:36.133817 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:37.150454 2026] [access_compat:error] [pid 11469:tid 140411565680384] [client 38.127.61.169:37366] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:53.394459 2026] [access_compat:error] [pid 11469:tid 140411641214720] [client 38.127.61.169:20276] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:57.129858 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:20:19.049847 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:20:35.700611 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.244.31:56724] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjIg9CmCSWTlPouqoqUkAAAANY"]
[Tue Mar 17 00:20:40.137784 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:03.658918 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:25.069852 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:47.106265 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:09.122508 2026] [proxy_fcgi:error] [pid 2304:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:30.125796 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:43.018398 2026] [access_compat:error] [pid 2305:tid 140411674785536] [client 38.127.61.169:20126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:22:51.034078 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:13.129813 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:34.070026 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:37.253609 2026] [:error] [pid 4740:tid 140411548894976] [client 74.7.228.16:58108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjJOQfYLcKp6Sb5AeICnAAAAFc"]
[Tue Mar 17 00:23:55.149774 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:16.133978 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:38.125839 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:59.129813 2026] [proxy_fcgi:error] [pid 11293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:25:20.141809 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:25:39.894957 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.244.31:34810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjJs5DEJR9VXonE_-0VVAAAARc"]
[Tue Mar 17 00:25:41.065851 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:02.099715 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:23.069811 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:46.130572 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55072] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:09.142343 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:30.147274 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:51.131457 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:12.129796 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:34.129873 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:55.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:29:16.129814 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:29:38.117880 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:02.158630 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:23.123846 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:44.145853 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:04.655108 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:39112] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjK-JDEJR9VXonE_-0WGAAAAQs"]
[Tue Mar 17 00:31:05.121853 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:26.130576 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:48.061843 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:09.327790 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:31.034500 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58154] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:52.126350 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:14.121861 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:35.103230 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:56.133809 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:34:18.133823 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:34:39.113239 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:00.133826 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:24.129783 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:45.135068 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:06.122065 2026] [proxy_fcgi:error] [pid 11469:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:28.129775 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:49.115252 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:10.124825 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:32.129790 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:54.126629 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:15.130474 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:36.129836 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:58.129811 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:39:10.154195 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.228.16:41362] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjM3gQohV2v-7oj5HHK1AAAAYc"]
[Tue Mar 17 00:39:20.033825 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:39:41.125770 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:02.147248 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:23.129867 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:45.130235 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:07.117807 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:28.133849 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:37.193531 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.244.31:41046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjNcaBJNF7axNlVR0XKRAAAABA"]
[Tue Mar 17 00:41:49.075116 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:10.125822 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:31.125873 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:53.058927 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:16.129786 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:37.099066 2026] [proxy_fcgi:error] [pid 11469:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:58.070034 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:44:19.126957 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:44:19.457334 2026] [:error] [pid 2304:tid 140411691570944] [client 74.7.228.16:45800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjOE8h3JZxwdBQwPYHBsQAAAIY"]
[Tue Mar 17 00:44:41.125787 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:02.384267 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:24.122555 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:45.139794 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:07.081815 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:28.037884 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:45.803130 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.244.31:58284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjOpe82sZHvlq4xgHqO5QAAAoE"]
[Tue Mar 17 00:46:49.145804 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:11.127560 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:32.129784 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:53.129812 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:14.145855 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:35.129932 2026] [proxy_fcgi:error] [pid 2325:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:56.121918 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:49:17.134453 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:49:36.830450 2026] [:error] [pid 2304:tid 140411725141760] [client 74.7.228.16:38712] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjPUMh3JZxwdBQwPYHCGgAAAII"]
[Tue Mar 17 00:49:38.125803 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:00.137864 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:21.133848 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:43.097837 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:09.108134 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:31.058248 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:52.149813 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:13.109971 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:14.627138 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.244.31:39234] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjP7sh3JZxwdBQwPYHCRAAAAIc"]
[Tue Mar 17 00:52:34.044474 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:55.133776 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:16.186149 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:37.146572 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:58.117649 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:19.130572 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:40.133828 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42110] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:58.909379 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.228.16:48978] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjQktCmCSWTlPouqoqYEgAAAMw"]
[Tue Mar 17 00:55:01.118000 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:55:22.126929 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:55:43.129927 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:04.129781 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:31.103429 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:52.129789 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:13.129888 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:17.869034 2026] [:error] [pid 4740:tid 140411607643904] [client 74.7.244.31:40880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjRHQfYLcKp6Sb5AeIGMwAAAFA"]
[Tue Mar 17 00:57:34.134540 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:55.131583 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43762] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:16.069828 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:37.125835 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44120] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:58.129797 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:59:19.149945 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:59:40.057833 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44700] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:01.070047 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:10.128252 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.228.16:60484] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjRyu82sZHvlq4xgHqQNAAAAok"]
[Tue Mar 17 01:00:22.130265 2026] [proxy_fcgi:error] [pid 2304:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:43.133791 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:04.133822 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45394] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:25.129796 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:53.133800 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:06.703521 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] [client 162.241.120.138:53726] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:02:14.128354 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:36.137851 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:57.129819 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:03:18.124915 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:03:40.129856 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:01.122658 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:22.125771 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:43.150409 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:04.549397 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47558] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:26.125795 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:30.756571 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.228.16:35638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjTCpDEJR9VXonE_-0YuQAAAQ0"]
[Tue Mar 17 01:05:47.126614 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:08.121195 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:30.126411 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:51.125851 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48270] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:57.223838 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] [client 138.68.109.37:48614] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:07:15.123920 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:07:36.141869 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:07:54.754120 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.244.31:33564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjTmpDEJR9VXonE_-0Y3AAAAQ8"]
[Tue Mar 17 01:07:57.141940 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:08:19.129811 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:08:40.134677 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:02.046481 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:23.141833 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:44.150220 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:05.129905 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:26.074391 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:41.824982 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.228.16:38120] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjUQZDEJR9VXonE_-0ZAgAAARM"]
[Tue Mar 17 01:10:47.125802 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:08.133838 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:29.085467 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51238] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:51.181500 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51504] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:12.129784 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:34.129811 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51780] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:57.077867 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:13:15.255204 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.244.31:48668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjU26BJNF7axNlVR0XM-QAAAA8"]
[Tue Mar 17 01:13:18.125052 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:13:41.070195 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:03.123575 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:24.056191 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:46.137793 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:07.074489 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:28.142217 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:50.129826 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:05.371947 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.228.16:36852] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjVhQQohV2v-7oj5HHNDAAAAYg"]
[Tue Mar 17 01:16:11.119625 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:32.123240 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:53.133844 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:14.133807 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:36.049154 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:57.121891 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:18:18.125815 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:18:39.045869 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:00.092259 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:24.134421 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.244.31:38102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjWTO82sZHvlq4xgHqSPAAAAos"]
[Tue Mar 17 01:19:25.127929 2026] [proxy_fcgi:error] [pid 11469:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55648] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:46.034106 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:07.133842 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:28.128042 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:49.057817 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:10.205085 2026] [:error] [pid 2304:tid 140411741927168] [client 74.7.228.16:35136] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjWtsh3JZxwdBQwPYHEZAAAAIA"]
[Tue Mar 17 01:21:11.123911 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:33.080636 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:54.129776 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:15.065851 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:36.285837 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:58.269830 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:23:20.128353 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:23:41.138980 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:02.149828 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:23.113827 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:33.974548 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.244.31:54972] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjXgQfYLcKp6Sb5AeIIXwAAAFE"]
[Tue Mar 17 01:24:47.118909 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:08.137820 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:30.133822 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:51.057810 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:13.125843 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:32.205400 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.228.16:57684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjX-AfYLcKp6Sb5AeIIdQAAAEM"]
[Tue Mar 17 01:26:34.126537 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:55.129794 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:27:16.125795 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:27:38.137824 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:00.130211 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:21.127857 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:42.133866 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:03.123469 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:24.094985 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:45.126478 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:01.074097 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.244.31:38922] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjYyQfYLcKp6Sb5AeIIsgAAAEM"]
[Tue Mar 17 01:30:08.125495 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:29.128133 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:50.142487 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:12.133795 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:35.126476 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:56.093824 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:17.125829 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:38.133782 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:59.037802 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:33:22.138016 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:33:43.129811 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:04.125791 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:26.327430 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:48.125864 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:04.105364 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.244.31:59714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjZ-O82sZHvlq4xgHqT7gAAAoo"]
[Tue Mar 17 01:35:09.125775 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:31.126107 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:52.129800 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:13.121797 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:35.129794 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:56.137777 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:37:17.141785 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:37:39.115696 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:00.137814 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:21.133878 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:44.149791 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:05.132524 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:26.137816 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:47.073944 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:10.125808 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:31.033861 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:52.132641 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:13.117841 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:34.137811 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:56.129838 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:42:17.140669 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:42:21.690547 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.244.31:55528] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjbrQfYLcKp6Sb5AeIJkwAAAEc"]
[Tue Mar 17 01:42:39.049912 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:00.116197 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:11.172437 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.228.16:50816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjb36BJNF7axNlVR0XPawAAAAQ"]
[Tue Mar 17 01:43:22.061794 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:43.129887 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:05.130652 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:26.118607 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:47.122791 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:08.134045 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:31.129932 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:52.125787 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:13.102087 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:34.125854 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:56.114558 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:17.115317 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:29.255062 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:46340] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjc4ZDEJR9VXonE_-0b_wAAAQs"]
[Tue Mar 17 01:47:38.058426 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41622] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:46.438228 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:45978] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjc8pDEJR9VXonE_-0cBQAAAQ4"]
[Tue Mar 17 01:48:00.121792 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41838] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:48:21.133795 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:48:40.171374 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] [client 62.151.179.222:49450] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Tue Mar 17 01:48:43.126404 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:05.132587 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:27.118618 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:48.069818 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:09.133811 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:30.129779 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:51.613801 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:13.057858 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:34.061873 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:55.129337 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:16.125972 2026] [proxy_fcgi:error] [pid 11469:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44156] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:38.042085 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:55.459558 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.244.31:39554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjeJwQohV2v-7oj5HHPCwAAAY4"]
[Tue Mar 17 01:52:59.125826 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:53:21.067209 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:53:29.254618 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.228.16:51782] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjeSaBJNF7axNlVR0XQWQAAABM"]
[Tue Mar 17 01:53:42.126270 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:03.033849 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:26.121873 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:54.126122 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:15.025795 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:37.113876 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:58.115127 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:56:19.121794 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:56:19.468764 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] [client 205.185.123.125:43564] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:56:40.128938 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:01.121899 2026] [proxy_fcgi:error] [pid 11469:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:22.129950 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46652] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:43.153844 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:59.937410 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.244.31:43396] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjfV9CmCSWTlPouqoqeeQAAANg"]
[Tue Mar 17 01:58:04.045908 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:25.096151 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:46.125896 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:47.555304 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.228.16:39276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjfhwQohV2v-7oj5HHPcQAAAYw"]
[Tue Mar 17 01:59:07.126388 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:59:28.137147 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:59:49.137791 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:16.130508 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:37.098447 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:58.023589 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:01:20.129788 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:01:41.087985 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:03.113831 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:24.121824 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:45.130216 2026] [proxy_fcgi:error] [pid 2325:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:06.123641 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:27.125913 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:48.149008 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:52.646344 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.228.16:43614] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjguO82sZHvlq4xgHqWSQAAApg"]
[Tue Mar 17 02:04:09.061987 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50542] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:04:30.129797 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:04:51.137821 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:13.154141 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:37.157845 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:59.141819 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:06:20.142570 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:06:42.135167 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:04.137855 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:25.102860 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:46.133803 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:07.125840 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:28.130558 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:40.387365 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.244.31:53026] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjh2NCmCSWTlPouqoqfWQAAAMY"]
[Tue Mar 17 02:08:49.106801 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:10.045874 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:18.307259 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.228.16:45164] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjh_pDEJR9VXonE_-0d1gAAAQA"]
[Tue Mar 17 02:09:33.129790 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:54.174906 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54006] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:10:15.088819 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:10:36.115085 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:01.133826 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:23.129937 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:44.137801 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:05.061844 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:26.133989 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:47.138679 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:08.133807 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:29.986693 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:51.157868 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:58.318402 2026] [:error] [pid 4740:tid 140411548894976] [client 74.7.244.31:41540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjjFgfYLcKp6Sb5AeIMJAAAAFc"]
[Tue Mar 17 02:14:12.129871 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:14:34.133799 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:14:55.118772 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:16.154547 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56238] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:37.118171 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:39.232468 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.228.16:36092] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjje9CmCSWTlPouqoqf1AAAAMw"]
[Tue Mar 17 02:15:58.134523 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:16:23.129929 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:16:44.139850 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:05.070571 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:26.125818 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:28.349840 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] [client 80.82.121.21:56190] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Tue Mar 17 02:17:47.125928 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:08.115726 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:30.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:51.133993 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:12.145961 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:33.142578 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:56.045834 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:17.149897 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:38.105848 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:52.290123 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.228.16:33880] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjktO82sZHvlq4xgHqX8QAAApE"]
[Tue Mar 17 02:20:59.140509 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59338] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:21:20.130122 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:21:45.150723 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:07.196832 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:29.146054 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:51.147397 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:13.618950 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:35.038307 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:56.150133 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:17.177796 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:20.403575 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.244.31:40464] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjlhJDEJR9VXonE_-0fjwAAAQk"]
[Tue Mar 17 02:24:38.133893 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:59.125101 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:25:20.150879 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:25:41.149783 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:02.140875 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:17.021511 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.228.16:45908] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjl-QfYLcKp6Sb5AeINWgAAAFg"]
[Tue Mar 17 02:26:23.067189 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:44.137828 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:07.103378 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34594] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:28.155881 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:51.095755 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:12.159193 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:34.129828 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:55.189859 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:29:17.152344 2026] [proxy_fcgi:error] [pid 2325:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:29:27.515485 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.244.31:38130] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjmt5DEJR9VXonE_-0f3gAAARE"]
[Tue Mar 17 02:29:39.129820 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:00.150718 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36128] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:21.169813 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:42.146660 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:03.145781 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:23.598343 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.228.16:51826] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjnK-82sZHvlq4xgHqYowAAApM"]
[Tue Mar 17 02:31:24.113832 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:46.146494 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:07.133881 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:29.149102 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:50.153823 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:11.137885 2026] [proxy_fcgi:error] [pid 2305:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:32.165888 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:54.141996 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:16.141782 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:38.117944 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:57.229431 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.244.31:55240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjoAQfYLcKp6Sb5AeIOXQAAAEM"]
[Tue Mar 17 02:34:59.089175 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39272] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:35:20.141839 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:35:42.132822 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:04.125794 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:25.033898 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:46.129045 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:07.113885 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:28.149826 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:50.089973 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:11.116214 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:32.085859 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:53.141936 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:14.163755 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:35.137799 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:56.133115 2026] [proxy_fcgi:error] [pid 4740:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:40:12.971021 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.244.31:58212] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjpPJDEJR9VXonE_-0g9gAAARY"]
[Tue Mar 17 02:40:17.116005 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:40:38.130007 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:00.053568 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:21.109854 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:42.137803 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:03.134206 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:24.137789 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:45.211127 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:07.129825 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:28.061836 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:49.151987 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:10.129805 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:31.157832 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:52.125799 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:13.128499 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:34.133788 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:39.836503 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.244.31:57940] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjqg-82sZHvlq4xgHqZugAAApg"]
[Tue Mar 17 02:45:56.129828 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:17.126208 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:38.143048 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:59.133788 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:47:21.159752 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:47:22.931614 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.228.16:57966] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjq6u82sZHvlq4xgHqZ2QAAAoA"]
[Tue Mar 17 02:47:42.045806 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:03.129814 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:25.453203 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:47.133845 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:08.134521 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:29.060163 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:50.158562 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:11.145806 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:17.054204 2026] [:error] [pid 4740:tid 140411540502272] [client 45.62.98.251:45878] [client 45.62.98.251] ModSecurity: Multipart parsing error: Multipart: Invalid Content-Disposition header (-11): form-data; name=berkas; filename=lock360.php; filename*=utf-8''lock360.php. [hostname "bandeirantesbombas.com.br"] [uri "/.trash7206/index.php"] [unique_id "abjrmAfYLcKp6Sb5AeIPSAAAAFg"]
[Tue Mar 17 02:50:33.129251 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:51.550297 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.244.31:53068] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjruwQohV2v-7oj5HHS8QAAAYk"]
[Tue Mar 17 02:50:54.121827 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:15.130526 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:36.169829 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:57.118918 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:52:18.141852 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:52:29.629901 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.228.16:36616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjsHQQohV2v-7oj5HHTBwAAAZQ"]
[Tue Mar 17 02:52:39.161824 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:00.052183 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:21.821919 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49786] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:43.130595 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:04.048100 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:26.229808 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50334] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:48.050199 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:09.185802 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50684] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:30.157789 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:51.133813 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:12.103371 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.31:46102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjs_KBJNF7axNlVR0XVagAAAAY"]
[Tue Mar 17 02:56:12.106042 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51180] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:33.133791 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:54.134204 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:15.033963 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:36.142427 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:53.411703 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.228.16:35384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjtYZDEJR9VXonE_-0iAgAAAQI"]
[Tue Mar 17 02:57:57.151805 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:58:18.137817 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:58:39.133845 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:01.041669 2026] [proxy_fcgi:error] [pid 11469:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:22.060079 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:44.129957 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:05.134364 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:26.129785 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:47.126327 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:15.057290 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:22.069997 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.244.31:44520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjuMu82sZHvlq4xgHqbXgAAApA"]
[Tue Mar 17 03:01:36.145807 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:58.168911 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:02:19.138318 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:02:40.140013 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:00.135248 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.228.16:59026] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjulAfYLcKp6Sb5AeIQTQAAAFE"]
[Tue Mar 17 03:03:01.139727 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:22.125909 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:44.137722 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55012] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:06.129815 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:27.121791 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:48.121823 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:09.166024 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:31.045868 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:53.074918 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56182] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:14.057850 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:36.133815 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:58.149018 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:07:19.129917 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:07:40.176982 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:02.134497 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:23.029815 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:28.793071 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:35564] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjv3NCmCSWTlPouqoqj4wAAANM"]
[Tue Mar 17 03:08:44.116685 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:06.033814 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:28.121778 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:49.133804 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:10.121804 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:32.137826 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:53.116042 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:11:14.057819 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:11:33.624813 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] [client 179.188.53.243:59330] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.624855 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] (104)Connection reset by peer: [client 179.188.53.243:59330] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.646040 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] [client 179.188.53.243:59728] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.646081 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (104)Connection reset by peer: [client 179.188.53.243:59728] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.665837 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] [client 179.188.53.243:33040] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.665890 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:33040] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.668336 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] [client 179.188.53.243:59574] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668367 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (104)Connection reset by peer: [client 179.188.53.243:59574] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.668593 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] [client 179.188.53.243:60590] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668617 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (104)Connection reset by peer: [client 179.188.53.243:60590] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.668675 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] [client 179.188.53.243:32876] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668696 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (104)Connection reset by peer: [client 179.188.53.243:32876] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.668777 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] [client 179.188.53.243:59912] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668818 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:59912] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.669172 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] [client 179.188.53.243:33312] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.669191 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:33312] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.674337 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] [client 179.188.53.243:33624] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.674380 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (104)Connection reset by peer: [client 179.188.53.243:33624] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.690714 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] [client 69.197.179.242:57274] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Tue Mar 17 03:11:33.690768 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (104)Connection reset by peer: [client 69.197.179.242:57274] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Tue Mar 17 03:11:33.700392 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] [client 179.188.53.243:60118] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.700439 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:60118] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.701528 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] [client 179.188.53.243:60380] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.701557 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:60380] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.722473 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] [client 179.188.53.243:60746] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.722515 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:60746] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.731002 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] [client 179.188.53.243:60964] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.731035 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:60964] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:33.731460 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] [client 179.188.53.243:33514] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.731502 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:33514] AH01075: Error dispatching request to :
[Tue Mar 17 03:11:54.212742 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.244.31:53550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjwqqBJNF7axNlVR0XWvAAAAAc"]
[Tue Mar 17 03:13:32.966944 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.228.16:53740] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjxDO82sZHvlq4xgHqcFAAAAoU"]
[Tue Mar 17 03:18:33.259265 2026] [:error] [pid 4740:tid 140411741927168] [client 74.7.228.16:36576] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjyOQfYLcKp6Sb5AeIRHgAAAEA"]
[Tue Mar 17 03:19:12.774135 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.244.31:54600] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjyYMh3JZxwdBQwPYHNigAAAJI"]
[Tue Mar 17 03:24:11.723239 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.228.16:37526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjziwQohV2v-7oj5HHUzgAAAYE"]
[Tue Mar 17 03:26:55.111814 2026] [:error] [pid 2304:tid 140411599251200] [client 204.12.208.18:59736] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abj0L8h3JZxwdBQwPYHOCgAAAJE"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Tue Mar 17 03:29:42.311963 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.244.31:39178] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj01tCmCSWTlPouqoqlNwAAAMM"]
[Tue Mar 17 03:30:17.554810 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.228.16:58454] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj0-QfYLcKp6Sb5AeIRzgAAAEc"]
[Tue Mar 17 03:34:44.022836 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.244.31:49214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj2BJDEJR9VXonE_-0ldwAAARQ"]
[Tue Mar 17 03:36:09.324235 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.228.16:53606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj2WQfYLcKp6Sb5AeISPgAAAFE"]
[Tue Mar 17 03:40:44.191615 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.244.31:54238] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj3bKBJNF7axNlVR0XYZwAAAAg"]
[Tue Mar 17 03:45:49.715650 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:55902] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj4nch3JZxwdBQwPYHPDwAAAJE"]
[Tue Mar 17 03:48:15.198475 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.228.16:40052] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj5L-82sZHvlq4xgHqeLwAAAoQ"]
[Tue Mar 17 03:51:14.741582 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.244.31:44338] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj54gfYLcKp6Sb5AeITPAAAAEU"]
[Tue Mar 17 03:53:54.038848 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.228.16:59406] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj6gqBJNF7axNlVR0XZAQAAAAo"]
[Tue Mar 17 03:56:21.000156 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.244.31:48710] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj7FNCmCSWTlPouqoqmvgAAANI"]
[Tue Mar 17 03:59:03.618882 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.228.16:42862] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj7twQohV2v-7oj5HHWzgAAAYM"]
[Tue Mar 17 04:01:26.284755 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.244.31:49634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj8Rsh3JZxwdBQwPYHQGQAAAJc"]
[Tue Mar 17 04:05:03.806356 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.228.16:41580] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj9H9CmCSWTlPouqoqnPgAAAMM"]
[Tue Mar 17 04:06:27.374814 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:58544] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj9c5DEJR9VXonE_-0nSgAAAQs"]
[Tue Mar 17 04:10:45.867050 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.228.16:39570] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj-ddCmCSWTlPouqoqngQAAANA"]
[Tue Mar 17 04:13:45.434690 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.244.31:50348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj_KZDEJR9VXonE_-0ntwAAAQY"]
[Tue Mar 17 04:15:49.643316 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:44354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj_paBJNF7axNlVR0XaPQAAAAc"]
[Tue Mar 17 04:19:12.600609 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.244.31:60226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkAcO82sZHvlq4xgHqf7AAAApc"]
[Tue Mar 17 04:22:21.039423 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.228.16:48280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkBLZDEJR9VXonE_-0oYQAAAQc"]
[Tue Mar 17 04:28:18.403641 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.228.16:45766] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkCkgQohV2v-7oj5HHYiAAAAZA"]
[Tue Mar 17 04:30:15.965051 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.31:52256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkDB6BJNF7axNlVR0Xa-gAAAAY"]
[Tue Mar 17 04:35:13.154477 2026] [:error] [pid 4740:tid 140411658000128] [client 74.7.228.16:48050] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkEMQfYLcKp6Sb5AeIWIQAAAEo"]
[Tue Mar 17 04:35:18.866052 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.244.31:35908] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkENgfYLcKp6Sb5AeIWLAAAAFE"]
[Tue Mar 17 04:40:30.321562 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.228.16:33070] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkFbQQohV2v-7oj5HHZIAAAAZc"]
[Tue Mar 17 04:46:00.007816 2026] [:error] [pid 2304:tid 140411691570944] [client 74.7.244.31:41174] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkGuMh3JZxwdBQwPYHSvAAAAIY"]
[Tue Mar 17 04:50:58.475483 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.228.16:34624] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkH4u82sZHvlq4xgHqh6QAAAok"]
[Tue Mar 17 04:51:05.943464 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.244.31:33082] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkH6ch3JZxwdBQwPYHTYQAAAJU"]
[Tue Mar 17 04:51:22.631659 2026] [access_compat:error] [pid 2325:tid 140411632822016] [client 45.94.31.197:45016] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 04:56:17.850810 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:50262] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkJIdCmCSWTlPouqoqqogAAANM"]
[Tue Mar 17 04:56:30.611759 2026] [:error] [pid 4740:tid 140411557287680] [client 74.7.244.31:52484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkJLgfYLcKp6Sb5AeIX8wAAAFY"]
[Tue Mar 17 05:01:29.573160 2026] [:error] [pid 4740:tid 140411590858496] [client 74.7.228.16:39890] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkKWQfYLcKp6Sb5AeIYWgAAAFI"]
[Tue Mar 17 05:01:35.776892 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.244.31:35918] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkKXwQohV2v-7oj5HHbJgAAAYA"]
[Tue Mar 17 05:06:52.132785 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.228.16:42382] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkLnMh3JZxwdBQwPYHUqgAAAIw"]
[Tue Mar 17 05:06:53.550105 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.244.31:45612] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkLnch3JZxwdBQwPYHUqwAAAJQ"]
[Tue Mar 17 05:09:14.891046 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.228.16:53890] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkMKgfYLcKp6Sb5AeIY6wAAAEc"]
[Tue Mar 17 05:10:32.299721 2026] [access_compat:error] [pid 4740:tid 140411699963648] [client 73.231.36.91:54536] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:12:02.616863 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.244.31:47894] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkM0tCmCSWTlPouqoqrfgAAAM4"]
[Tue Mar 17 05:13:07.627169 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.228.16:33266] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkNE8h3JZxwdBQwPYHVBQAAAIE"]
[Tue Mar 17 05:17:21.007123 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.244.31:46784] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkOEch3JZxwdBQwPYHVTQAAAIM"]
[Tue Mar 17 05:18:19.835430 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.228.16:59276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkOS9CmCSWTlPouqoqsYQAAAM0"]
[Tue Mar 17 05:22:27.694826 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.244.31:42152] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkPQ-82sZHvlq4xgHqkJgAAApQ"]
[Tue Mar 17 05:23:24.166561 2026] [access_compat:error] [pid 11469:tid 140411616036608] [client 181.192.86.119:24494] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:23:38.314818 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.228.16:49442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkPish3JZxwdBQwPYHWHgAAAJE"]
[Tue Mar 17 05:28:40.838156 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.228.16:33420] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkQuAfYLcKp6Sb5AeIa6wAAAEU"]
[Tue Mar 17 05:32:58.036604 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.244.31:42398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkRutCmCSWTlPouqoqtTAAAAME"]
[Tue Mar 17 05:35:27.872794 2026] [access_compat:error] [pid 2325:tid 140411641214720] [client 45.154.98.78:40684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:38:18.414819 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.244.31:54658] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkS-pDEJR9VXonE_-0uiQAAARc"]
[Tue Mar 17 05:39:06.323428 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.228.16:49458] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkTKgQohV2v-7oj5HHeHgAAAYA"]
[Tue Mar 17 05:43:53.359935 2026] [access_compat:error] [pid 11293:tid 140411733534464] [client 45.94.31.197:46112] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:44:30.838197 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.228.16:57218] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkUbu82sZHvlq4xgHql5QAAApU"]
[Tue Mar 17 05:50:10.999172 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.244.31:37594] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkVwtCmCSWTlPouqoqvCgAAAMU"]
[Tue Mar 17 05:55:11.124979 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.228.16:40292] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkW75DEJR9VXonE_-0xPAAAARQ"]
[Tue Mar 17 05:55:34.867196 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.244.31:56072] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkXBsh3JZxwdBQwPYHaJwAAAJI"]
[Tue Mar 17 06:00:21.075081 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.228.16:53622] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkYJaBJNF7axNlVR0Xl_gAAAAY"]
[Tue Mar 17 06:00:36.441309 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.244.31:51686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkYNO82sZHvlq4xgHqqdgAAAo8"]
[Tue Mar 17 06:05:32.885963 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.228.16:52540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkZXKBJNF7axNlVR0XmdwAAAAM"]
[Tue Mar 17 06:05:53.758540 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.244.31:41530] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkZcZDEJR9VXonE_-011QAAAQc"]
[Tue Mar 17 06:10:40.111432 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.228.16:60024] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkakAQohV2v-7oj5HHldwAAAZU"]
[Tue Mar 17 06:10:58.107906 2026] [:error] [pid 2304:tid 140411658000128] [client 74.7.244.31:41956] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkaosh3JZxwdBQwPYHewQAAAIo"]
[Tue Mar 17 06:16:02.284908 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.228.16:47590] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkb0qBJNF7axNlVR0XoEAAAAAY"]
[Tue Mar 17 06:16:25.541111 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.244.31:48722] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkb6QfYLcKp6Sb5AeIkGgAAAFg"]
[Tue Mar 17 06:21:12.375037 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:49572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkdCKBJNF7axNlVR0Xo6QAAAAc"]
[Tue Mar 17 06:21:33.021984 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.244.31:40726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkdHQQohV2v-7oj5HHnuAAAAY0"]
[Tue Mar 17 06:26:36.947337 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.228.16:45312] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkeTAQohV2v-7oj5HHoaAAAAZY"]
[Tue Mar 17 06:26:53.114860 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.244.31:51226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkeXQQohV2v-7oj5HHocwAAAYM"]
[Tue Mar 17 06:31:43.389368 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.228.16:43662] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkffwfYLcKp6Sb5AeImKgAAAEM"]
[Tue Mar 17 06:37:23.427208 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.244.31:47058] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkg09CmCSWTlPouqoq6DQAAAMw"]
[Tue Mar 17 06:42:13.179073 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.228.16:33150] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkh9ZDEJR9VXonE_-06hwAAARI"]
[Tue Mar 17 06:42:26.014254 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.244.31:51674] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkiAsh3JZxwdBQwPYHiwgAAAJM"]
[Tue Mar 17 06:47:38.162097 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.228.16:46830] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkjOpDEJR9VXonE_-07MgAAAQo"]
[Tue Mar 17 06:53:01.940730 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.244.31:47936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkkfdCmCSWTlPouqoq7ZAAAANg"]
[Tue Mar 17 06:58:08.339183 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.16:59730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abklsKBJNF7axNlVR0XtQQAAABU"]
[Tue Mar 17 06:58:26.475033 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.244.31:34416] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abklwsh3JZxwdBQwPYHkrwAAAJU"]
[Tue Mar 17 07:03:19.459184 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.228.16:34304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkm56BJNF7axNlVR0Xt5AAAABg"]
[Tue Mar 17 07:03:33.643002 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:47456] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkm9ch3JZxwdBQwPYHlnAAAAJE"]
[Tue Mar 17 07:08:46.880753 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.228.16:50178] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkoLnQLOys_ArAUsGMERQAAAc0"]
[Tue Mar 17 07:08:57.295201 2026] [:error] [pid 4740:tid 140411641214720] [client 74.7.244.31:56054] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkoOQfYLcKp6Sb5AeIqMAAAAEw"]
[Tue Mar 17 07:14:02.962610 2026] [:error] [pid 3788:tid 140411565680384] [client 74.7.244.31:54000] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkpahACmvdph3vou-IDJwAAAVU"]
[Tue Mar 17 07:15:43.950461 2026] [:error] [pid 5398:tid 140411741927168] [client 74.7.228.16:43202] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkpzwRES9pL8P-grjlaaAAAAgA"]
[Tue Mar 17 07:19:25.536770 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.244.31:57776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkqre82sZHvlq4xgHq0rgAAAoI"]
[Tue Mar 17 07:21:21.557258 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.228.16:33834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkrIe82sZHvlq4xgHq04wAAAo8"]
[Tue Mar 17 07:24:31.823058 2026] [:error] [pid 6002:tid 140411599251200] [client 74.7.244.31:43614] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkr3_AKZeKGvQeoFhk_OAAAAtE"]
[Tue Mar 17 07:26:21.778582 2026] [:error] [pid 5398:tid 140411716749056] [client 74.7.228.16:35732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abksTQRES9pL8P-grjla6AAAAgM"]
[Tue Mar 17 07:29:57.374819 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.244.31:40466] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abktJQQohV2v-7oj5HHt1QAAAZE"]
[Tue Mar 17 07:31:43.870506 2026] [:error] [pid 6002:tid 140411683178240] [client 74.7.228.16:39776] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abktj_AKZeKGvQeoFhk_ZwAAAsc"]
[Tue Mar 17 07:36:50.051377 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.228.16:36540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkuwgeiSKl8TjouI-b25QAAA8I"]
[Tue Mar 17 07:40:27.782882 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.244.31:56706] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkvmweiSKl8TjouI-b3IAAAA8A"]
[Tue Mar 17 07:46:46.094928 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.244.31:37004] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkxFgQohV2v-7oj5HHu7AAAAZU"]
[Tue Mar 17 07:47:11.946788 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.228.16:40732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkxL9CmCSWTlPouqoq_sgAAAMc"]
[Tue Mar 17 07:52:37.542605 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.16:56610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkydaBJNF7axNlVR0XyFAAAABU"]
[Tue Mar 17 07:57:29.384666 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.244.31:53608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkzme82sZHvlq4xgHq3kwAAAo8"]
[Tue Mar 17 08:02:32.733211 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:55026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk0yKBJNF7axNlVR0XyvgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:02:34.074762 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.244.31:58452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk0yu82sZHvlq4xgHq4JAAAApE"]
[Tue Mar 17 08:02:55.984029 2026] [:error] [pid 4712:tid 140411599251200] [client 74.7.228.16:60278] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk033QLOys_ArAUsGMHbwAAAdE"]
[Tue Mar 17 08:03:58.274918 2026] [:error] [pid 6002:tid 140411666392832] [client 74.7.241.46:56896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1HvAKZeKGvQeoFhlBRwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:04:26.319190 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:52386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1OgeiSKl8TjouI-b4zAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:05:18.811675 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:57032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1bhePVOt35XCGZP8jywAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:07:30.467026 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:58974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk18hePVOt35XCGZP8j-AAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:07:50.907015 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.244.31:53618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk2BqBJNF7axNlVR0XzewAAABE"]
[Tue Mar 17 08:08:12.566984 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.228.16:54344] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk2HAQohV2v-7oj5HHxGAAAAZY"]
[Tue Mar 17 08:08:29.431052 2026] [:error] [pid 4712:tid 140411708356352] [client 74.7.243.203:35446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2LXQLOys_ArAUsGMIGAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:09:08.363095 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2VNCmCSWTlPouqorB1wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:10:03.141086 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:51182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2iwQohV2v-7oj5HHxTAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:12:36.013778 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:38860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3JJDEJR9VXonE_-1EJgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:12:40.574883 2026] [:error] [pid 5398:tid 140411616036608] [client 74.7.243.203:35116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3KARES9pL8P-grjlfRQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:13:01.219649 2026] [:error] [pid 4712:tid 140411590858496] [client 74.7.243.203:46212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3PXQLOys_ArAUsGMIogAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:13:02.917833 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.244.31:48992] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk3Pu82sZHvlq4xgHq5qgAAAo0"]
[Tue Mar 17 08:13:12.841160 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.228.16:35330] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk3SAQohV2v-7oj5HHxpQAAAZA"]
[Tue Mar 17 08:14:49.256071 2026] [:error] [pid 662:tid 140411691570944] [client 74.7.241.46:58168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3qa60egQjobaJUYgG4gAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:15:17.049434 2026] [access_compat:error] [pid 6002:tid 140411590858496] [client 45.141.128.193:38611] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:18.286389 2026] [access_compat:error] [pid 11469:tid 140411733534464] [client 45.141.128.193:61583] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:20.072112 2026] [access_compat:error] [pid 6002:tid 140411607643904] [client 45.141.128.193:13187] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:35.398100 2026] [access_compat:error] [pid 662:tid 140411616036608] [client 172.83.254.207:28455] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:57.343265 2026] [access_compat:error] [pid 662:tid 140411674785536] [client 185.77.220.68:53769] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:59.484977 2026] [access_compat:error] [pid 2473:tid 140411708356352] [client 185.77.220.68:58745] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:16:01.623512 2026] [access_compat:error] [pid 1210:tid 140411658000128] [client 185.77.220.68:11793] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:16:23.460128 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:58176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4B5DEJR9VXonE_-1EvAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:26.148496 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.241.46:49994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4CHRXaaWotPICgYsbsQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:16:28.505121 2026] [:error] [pid 6002:tid 140411699963648] [client 74.7.241.46:49998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4C_AKZeKGvQeoFhlCjgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:30.091928 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4DgeiSKl8TjouI-b6EAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:31.483528 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:60920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4D5DEJR9VXonE_-1EwAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:33.916655 2026] [:error] [pid 32588:tid 140411574073088] [client 74.7.241.46:60924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ES8PwvOE6ZaeZxiFyQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:35.351234 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4E3QLOys_ArAUsGMI-wAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:37.264938 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:60942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4FJqmL8PQht4WJFlALQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:38.609394 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:59902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4FtCmCSWTlPouqorCywAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:39.927013 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:59916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4F9CmCSWTlPouqorC0AAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:41.488326 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:59922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4GQQohV2v-7oj5HHyDQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:42.910939 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.241.46:59926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4GpDEJR9VXonE_-1ExAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:44.727276 2026] [:error] [pid 1517:tid 140411741927168] [client 74.7.241.46:59936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HGHuKRvkhJseepPaZQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:46.125055 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:59942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HhePVOt35XCGZP8lSQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:47.475292 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:59946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HweiSKl8TjouI-b6GQAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:48.931469 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.241.46:38624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4IHRXaaWotPICgYsbvgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:50.237998 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.241.46:38628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4IhePVOt35XCGZP8lTQAAA4E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:51.490315 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:38636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4I5qmL8PQht4WJFlAOQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:54.212310 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:38642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4JNCmCSWTlPouqorC2gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:55.701600 2026] [:error] [pid 662:tid 140411632822016] [client 74.7.241.46:38644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4J660egQjobaJUYgHJwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:58.246646 2026] [:error] [pid 6002:tid 140411624429312] [client 74.7.241.46:38654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4KvAKZeKGvQeoFhlCnQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:59.575064 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:41294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4K3RXaaWotPICgYsbwQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:00.885376 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:41298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LKBJNF7axNlVR0X0dgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:02.370710 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:41300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LgRES9pL8P-grjlfuwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:03.895484 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:41302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LwRES9pL8P-grjlfvAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:05.191201 2026] [:error] [pid 32588:tid 140411674785536] [client 74.7.241.46:41304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4MS8PwvOE6ZaeZxiFzwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:06.559988 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:41316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Mu82sZHvlq4xgHq6ogAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:07.912158 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:41328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4M9CmCSWTlPouqorC4QAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:09.236232 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:45384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4NdCmCSWTlPouqorC4gAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:10.524759 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.241.46:45400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4NpqmL8PQht4WJFlAQwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:11.859268 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4N9CmCSWTlPouqorC5AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:13.231105 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:45418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Oe82sZHvlq4xgHq6qgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:14.543464 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4OtCmCSWTlPouqorC5gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:15.877257 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4O9CmCSWTlPouqorC5wAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:17.189583 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4PdCmCSWTlPouqorC6AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:18.523793 2026] [:error] [pid 1517:tid 140411548894976] [client 74.7.241.46:45952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4PmHuKRvkhJseepPadQAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:19.947528 2026] [:error] [pid 6002:tid 140411691570944] [client 74.7.241.46:45966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4P_AKZeKGvQeoFhlCqQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:21.303085 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:45980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4QXRXaaWotPICgYsb1gAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:22.590971 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.241.46:45982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4QhePVOt35XCGZP8lWwAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:24.205638 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:45996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4RJqmL8PQht4WJFlASgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:25.608461 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:46010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4RQQohV2v-7oj5HHyGgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:26.910958 2026] [:error] [pid 32588:tid 140411674785536] [client 74.7.241.46:46018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Ri8PwvOE6ZaeZxiF0gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:28.243526 2026] [:error] [pid 6002:tid 140411582465792] [client 74.7.241.46:44344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4SPAKZeKGvQeoFhlCqwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:29.631380 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:44360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4SZqmL8PQht4WJFlATAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:30.965189 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:44374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ShePVOt35XCGZP8lXwAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:32.283026 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:44376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TBePVOt35XCGZP8lYQAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:33.635023 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:44382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TQQohV2v-7oj5HHyHgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:34.797161 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:44390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TtCmCSWTlPouqorC7AAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:36.174999 2026] [:error] [pid 6002:tid 140411632822016] [client 74.7.241.46:44392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4UPAKZeKGvQeoFhlCrwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:38.359039 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:44408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Ue82sZHvlq4xgHq6yQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:39.725273 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:37656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Uy8PwvOE6ZaeZxiF1AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:41.075422 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:37658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4VQQohV2v-7oj5HHyIwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:42.603530 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:37666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Vi8PwvOE6ZaeZxiF1QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:44.145221 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:37682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4WAQohV2v-7oj5HHyJQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:45.705323 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:37692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4WQQohV2v-7oj5HHyJwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:47.157180 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:37706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4W9CmCSWTlPouqorC9wAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:48.482741 2026] [:error] [pid 1517:tid 140411716749056] [client 74.7.241.46:41392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XGHuKRvkhJseepPafwAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:49.830905 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:41406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XQQohV2v-7oj5HHyKgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:51.206763 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:41414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XweiSKl8TjouI-b6MwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:52.447366 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:41426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YKBJNF7axNlVR0X0iQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:53.743611 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:41442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YS8PwvOE6ZaeZxiF2AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:55.061579 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:41454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YwQohV2v-7oj5HHyLAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:56.463238 2026] [:error] [pid 1517:tid 140411565680384] [client 74.7.241.46:41468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ZGHuKRvkhJseepPagwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:58.939954 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:41470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Zi8PwvOE6ZaeZxiF3AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:18:03.876301 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.244.31:51510] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk4awQohV2v-7oj5HHyLwAAAYo"]
[Tue Mar 17 08:18:06.898952 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:47990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4btCmCSWTlPouqorDDgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:18:09.334841 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:49478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4cdCmCSWTlPouqorDEwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:18:14.539492 2026] [:error] [pid 5398:tid 140411590858496] [client 74.7.228.16:52276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk4dgRES9pL8P-grjlfxwAAAhI"]
[Tue Mar 17 08:18:36.739253 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:49484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4jAQohV2v-7oj5HHyTQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:18:56.678349 2026] [:error] [pid 1517:tid 140411624429312] [client 74.7.241.46:51746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4oGHuKRvkhJseepPamAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:00.443205 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4pO82sZHvlq4xgHq68QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:08.172445 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:45998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4rKBJNF7axNlVR0X0oAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:15.135071 2026] [:error] [pid 662:tid 140411616036608] [client 74.7.241.46:59582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4s660egQjobaJUYgHZgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:20.967675 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:59596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4uKBJNF7axNlVR0X0pwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:19:41.603367 2026] [:error] [pid 6002:tid 140411641214720] [client 74.7.241.46:45086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4zfAKZeKGvQeoFhlC5gAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:43.258825 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:34058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4z6BJNF7axNlVR0X0sQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:44.789551 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:34070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk40FKJy4A1bGlmj9BNgAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:46.163625 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk40u82sZHvlq4xgHq7AQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:47.533487 2026] [:error] [pid 1961:tid 140411548894976] [client 74.7.241.46:34094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk403RXaaWotPICgYscAgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:48.851586 2026] [:error] [pid 1517:tid 140411624429312] [client 74.7.241.46:59894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk41GHuKRvkhJseepParAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:51.307098 2026] [:error] [pid 32588:tid 140411574073088] [client 74.7.241.46:59906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk41y8PwvOE6ZaeZxiGCQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:58.703578 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:59916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk43pDEJR9VXonE_-1FGwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:00.207402 2026] [:error] [pid 5398:tid 140411733534464] [client 74.7.241.46:41416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk44ARES9pL8P-grjlf6wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:07.055693 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:41418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk451KJy4A1bGlmj9BNhgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:09.843615 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:44044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk46XRXaaWotPICgYscCwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:12.499458 2026] [:error] [pid 4712:tid 140411565680384] [client 74.7.241.46:44058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk47HQLOys_ArAUsGMJOAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:14.071310 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:44072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk47nRXaaWotPICgYscEAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:15.697296 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:44076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk473RXaaWotPICgYscEwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:17.265682 2026] [:error] [pid 662:tid 140411557287680] [client 74.7.241.46:44092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk48a60egQjobaJUYgHewAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:18.574368 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:33718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk48lKJy4A1bGlmj9BNhwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:20.195013 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:33728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk49JqmL8PQht4WJFlAnQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:23.473140 2026] [:error] [pid 6002:tid 140411741927168] [client 74.7.241.46:33734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk49_AKZeKGvQeoFhlC8QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:26.370945 2026] [:error] [pid 5398:tid 140411574073088] [client 74.7.241.46:33748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4-gRES9pL8P-grjlf9AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:29.199864 2026] [:error] [pid 662:tid 140411548894976] [client 74.7.241.46:33762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4_a60egQjobaJUYgHhQAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:31.937332 2026] [:error] [pid 5398:tid 140411691570944] [client 74.7.241.46:38852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4_wRES9pL8P-grjlf9gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:35.390849 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:38864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5AhePVOt35XCGZP8lnAAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:36.878967 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:38880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5BJDEJR9VXonE_-1FLAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:39.431584 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5B5DEJR9VXonE_-1FMAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:42.783727 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:34836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5CnRXaaWotPICgYscHwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:45.540722 2026] [:error] [pid 662:tid 140411674785536] [client 74.7.241.46:34838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5DK60egQjobaJUYgHiQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:47.968772 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:34840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5DgeiSKl8TjouI-b6cQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:49.339435 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5EVKJy4A1bGlmj9BNkQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:50.763351 2026] [:error] [pid 4712:tid 140411607643904] [client 74.7.241.46:49274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5EnQLOys_ArAUsGMJSgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:52.403162 2026] [:error] [pid 662:tid 140411649607424] [client 74.7.241.46:49278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5FK60egQjobaJUYgHjAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:53.847303 2026] [:error] [pid 5398:tid 140411691570944] [client 74.7.241.46:49286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5FQRES9pL8P-grjlgAAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:55.091431 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:49288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5F9CmCSWTlPouqorDYAAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:56.521141 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:49300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5GKBJNF7axNlVR0X0xgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:58.931206 2026] [:error] [pid 32588:tid 140411624429312] [client 74.7.241.46:49304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Gi8PwvOE6ZaeZxiGQAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:00.340852 2026] [:error] [pid 5398:tid 140411649607424] [client 74.7.241.46:33336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HARES9pL8P-grjlgAwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:01.703642 2026] [:error] [pid 5398:tid 140411641214720] [client 74.7.241.46:33348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HQRES9pL8P-grjlgBAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:03.183357 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:33350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HxePVOt35XCGZP8lpAAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:04.635157 2026] [:error] [pid 662:tid 140411616036608] [client 74.7.241.46:33360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5IK60egQjobaJUYgHjQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:06.147362 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.241.46:33362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5IgQohV2v-7oj5HHykQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:07.666535 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.241.46:33366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5I1KJy4A1bGlmj9BNkwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:08.814621 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:55048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5JO82sZHvlq4xgHq7SQAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 08:21:10.294123 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5JlKJy4A1bGlmj9BNlQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:17.319825 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:43196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5KwQohV2v-7oj5HHymgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:19.952708 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:55912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5L5qmL8PQht4WJFlApgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:21.407401 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:55918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5MRePVOt35XCGZP8lpwAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:23.856503 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.241.46:55932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5MhePVOt35XCGZP8lqAAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:29.457782 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:55946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Oe82sZHvlq4xgHq7UAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:30.959502 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:49242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5OtCmCSWTlPouqorDcAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:33.599129 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5PXRXaaWotPICgYscOQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:36.984937 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5QBePVOt35XCGZP8lsQAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:38.312753 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:34330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5QpqmL8PQht4WJFlAqgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:39.568508 2026] [:error] [pid 6002:tid 140411725141760] [client 74.7.241.46:34340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Q_AKZeKGvQeoFhlC_gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:40.879291 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:34354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "